Sciweavers

2362 search results - page 443 / 473
» The wireless network jamming problem
Sort
View
MOBISYS
2007
ACM
16 years 1 months ago
Simplifying cyber foraging for mobile devices
Cyber foraging is the transient and opportunistic use of compute servers by mobile devices. The short market life of such devices makes rapid modification of applications for remo...
Rajesh Krishna Balan, Darren Gergle, Mahadev Satya...
MOBISYS
2004
ACM
16 years 1 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay
PERCOM
2009
ACM
15 years 8 months ago
Towards Privacy-Sensitive Participatory Sensing
—The ubiquity of mobile devices has brought forth the concept of participatory sensing, whereby ordinary citizens can now contribute and share information from the urban environm...
Kuan Lun Huang, Salil S. Kanhere, Wen Hu
PDP
2008
IEEE
15 years 8 months ago
Privacy Protection in Context Transfer Protocol
In the future 4G wireless networks will span across different administrative domains. In order to provide secure seamless handovers in such an environment the Context Transfer Pro...
Giorgos Karopoulos, Georgios Kambourakis, Stefanos...
WCNC
2008
IEEE
15 years 8 months ago
User Assignment for MIMO-OFDM Systems with Multiuser Linear Precoding
— Recent work has developed single-carrier linear precoding for the multiuser downlink for multiple-input multipleoutput (MIMO) systems. This paper addresses the problem of user ...
Hassen Karaa, Raviraj S. Adve