Sciweavers

128 search results - page 18 / 26
» Technology evolution for mobile and personal communications
Sort
View
MOBIHOC
2003
ACM
16 years 1 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
160
Voted
IMC
2010
ACM
14 years 11 months ago
Listen to me if you can: tracking user experience of mobile network on social media
Social media sites such as Twitter continue to grow at a fast pace. People of all generations use social media to exchange messages and share experiences of their life in a timely...
Tongqing Qiu, Junlan Feng, Zihui Ge, Jia Wang, Jun...
CONEXT
2009
ACM
15 years 3 months ago
Cool-Tether: energy efficient on-the-fly wifi hot-spots using mobile phones
We consider the problem of providing ubiquitous yet affordable Internet connectivity to devices at home, at work, and on the move. In this context, we take advantage of two signif...
Ashish Sharma, Vishnu Navda, Ramachandran Ramjee, ...
112
Voted
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 8 months ago
Study of Best-Effort VoIP Handovers between WLAN and EVDO Networks
The IEEE 802.11 based Wireless LANs (WLANs) have emerged as a viable technology for supporting real-time applications such as Voice over IP (VoIP). Even the Personal Digital Assist...
Amit P. Jardosh, Rajeev Koodli, Tat Chan
152
Voted
WIMOB
2008
IEEE
15 years 8 months ago
A Multi-Sensing-Range Method for Position Estimation of Passive RFID Tags
— Recently, the RFID tag system is paid attention to as an identification source. Each RFID tag is attached to some object. With the unique ID of RFID tag, a user identifies the ...
Toshihiro Hori, Tomotaka Wada, Yuuki Ota, Norie Uc...