Sciweavers

817 search results - page 121 / 164
» Using Ontology for Personalized Mobile Message Computation
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 5 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
CHI
2002
ACM
16 years 5 days ago
Specifying preferences based on user history
Many applications require users to specify preferences. We support users in this task by letting them define preferences relative to their personal history or that of other users....
Loren G. Terveen, Jessica McMackin, Brian Amento, ...
MOBICOM
2006
ACM
15 years 5 months ago
Analysis and implications of student contact patterns derived from campus schedules
Characterizing mobility or contact patterns in a campus environment is of interest for a variety of reasons. Existing studies of these patterns can be classified into two basic a...
Vikram Srinivasan, Mehul Motani, Wei Tsang Ooi
MOBICOM
2004
ACM
15 years 5 months ago
PAVAN: a policy framework for content availabilty in vehicular ad-hoc networks
Advances in wireless communication, storage and processing are realizing next-generation in-vehicle entertainment systems. Even if hundreds of different video or audio titles are...
Shahram Ghandeharizadeh, Shyam Kapadia, Bhaskar Kr...
ICDCS
2009
IEEE
15 years 9 months ago
Distributed Processing of Spatial Alarms: A Safe Region-Based Approach
Spatial alarms are considered as one of the basic capabilities in future mobile computing systems for enabling personalization of location-based services. In this paper, we propos...
Bhuvan Bamba, Ling Liu, Arun Iyengar, Philip S. Yu