Sciweavers

4985 search results - page 70 / 997
» Re-Configurable Computing in Wireless
Sort
View
113
Voted
MOBISYS
2003
ACM
16 years 2 months ago
Protecting Applications with Transient Authentication
Mark D. Corner, Brian Noble
117
Voted
MOBIHOC
2008
ACM
16 years 2 months ago
Challenging benchmark for location discovery in ad hoc networks: foundations and applications
Davood Shamsi, Farinaz Koushanfar, Miodrag Potkonj...