Sciweavers

888 search results - page 34 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
PET
2010
Springer
15 years 3 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg
MOBISYS
2010
ACM
15 years 2 months ago
On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors
Mobile sensing is difficult without power. Emerging Computational RFIDs (CRFIDs) provide both sensing and generalpurpose computation without batteries--instead relying on small ca...
Jeremy Gummeson, Shane S. Clark, Kevin Fu, Deepak ...
ICWN
2004
15 years 1 months ago
Suitability of Existing Service Discovery Protocols for Mobile Users in an Ambient Intelligence Environment
Abstract-- Service discovery enables users to access information, resources and services anytime, anywhere. This involves a client, a service provider and an infrastructure for ser...
Davy Preuveneers, Yolande Berbers
73
Voted
CMG
2004
15 years 1 months ago
Generating Realistic TCP Workloads
The workload of a network is usually a heterogeneous aggregate of services and applications, driven by a large number of users. This complexity makes it challenging to evaluate th...
Félix Hernández-Campos, F. Donelson ...
WISEC
2010
ACM
14 years 9 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed