Sciweavers

978 search results - page 145 / 196
» WiMAX networks: from access to service platform
Sort
View
CORR
2011
Springer
198views Education» more  CORR 2011»
14 years 4 months ago
Quire: Lightweight Provenance for Smart Phone Operating Systems
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of ...
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anh...
ICWN
2003
14 years 11 months ago
Adapting Content for Mobile Devices in Heterogeneous Collaboration Environments
The portability of new miniaturized devices, together with their ability to connect conveniently to networks in different places, makes mobile computing possible. Recent advances ...
Sangmi Lee, Sung Hoon Ko, Geoffrey Fox
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 3 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
MOBICOM
2009
ACM
15 years 4 months ago
Revenue maximization and distributed power allocation in cognitive radio networks
Cognitive radio is an enabling technology that allows unlicensed users to opportunistically access the spectrum in order to enhance the spectrum efficiency. In this paper, we cons...
Shaolei Ren, Mihaela van der Schaar
SIGCOMM
1994
ACM
15 years 1 months ago
Signaling and Operating System Support for Native-Mode ATM Applications
Applications communicating over connectionless networks, such as IP, cannot obtain per-connection Quality of Service (QoS) guarantees. In contrast, the connection-oriented nature ...
Rosen Sharma, Srinivasan Keshav