Sciweavers

267 search results - page 12 / 54
» Wireless Handheld Devices Become Trusted Network Devices
Sort
View
WCNC
2008
IEEE
15 years 6 months ago
On the Deployment of Mobile Trusted Modules
— In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpo...
Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper
ICNP
2000
IEEE
15 years 4 months ago
TCP-Probing: Towards an Error Control Schema with Energy and Throughput Performance Gains
Today’s universal communications increasingly involve mobile and battery-powered devices (e.g. hand-held, laptop) over wired and wireless networks. Energy efficiency, as well as...
Vassilios Tsaoussidis, Hussein G. Badr
103
Voted
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 6 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
DEXAW
1999
IEEE
128views Database» more  DEXAW 1999»
15 years 4 months ago
Trends and Future of Mobile Computing
Networking homes, offices, cars and hand-held computers is the current trend of distributed mobile computing. The ever growing demand of the enterprise for integrating new technol...
Andry Rakotonirainy
115
Voted
ACMDIS
2004
ACM
15 years 5 months ago
Jukola: democratic music choice in a public space
Jukola is an interactive MP3 Jukebox device designed to allow a group of people in a public space to democratically choose the music being played. A public display is used to nomi...
Kenton O'Hara, Matthew Lipson, Marcel Jansen, Axel...