Sciweavers

4985 search results - page 200 / 997
» Re-Configurable Computing in Wireless
Sort
View
PERCOM
2005
ACM
16 years 3 months ago
Link Layer Security for SAHN Protocols
Abstract-- Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
CHI
2002
ACM
16 years 4 months ago
What is that?: gesturing to determine device identity
Computing devices can seamlessly recognize one another as they join and leave a wireless network, but users often experience difficulty identifying a desired device from a continu...
Colin Swindells, Kori M. Inkpen
MOBIHOC
2012
ACM
13 years 6 months ago
Enforcing dynamic spectrum access with spectrum permits
Dynamic spectrum access is a maturing technology that allows next generation wireless devices to make highly efficient use of wireless spectrum. Spectrum can be allocated on an o...
Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher ...
CHI
2005
ACM
16 years 4 months ago
Using context-aware computing to reduce the perceived burden of interruptions from mobile devices
The potential for sensor-enabled mobile devices to proactively present information when and where users need it ranks among the greatest promises of ubiquitous computing. Unfortun...
Joyce Ho, Stephen S. Intille
PODC
2004
ACM
15 years 9 months ago
Computation in networks of passively mobile finite-state sensors
We explore the computational power of networks of small resource-limited mobile agents. We define two new models of computation based on pairwise interactions of finite-state ag...
Dana Angluin, James Aspnes, Zoë Diamadi, Mich...