Sciweavers

9401 search results - page 1847 / 1881
» Wireless Networks
Sort
View
WISEC
2010
ACM
15 years 4 months ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko
PERCOM
2009
ACM
15 years 4 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
PERCOM
2009
ACM
15 years 4 months ago
NoShake: Content Stabilization for Shaking Screens of Mobile Devices
—Consumer electronics and mobile devices intended for pervasive applications are often subject to shaking that makes their screen difficult to read. To address this usability cha...
Ahmad Rahmati, Clayton Shepard, Lin Zhong
80
Voted
ICC
2009
IEEE
103views Communications» more  ICC 2009»
15 years 4 months ago
Optimization of Split-And-Combine Relaying
Relays play an important role for increasing rate and reducing energy consumption of wireless networks. In this paper we consider a three-node network (source, relay, destination)...
Raymond Yim, Andreas F. Molisch, Jinyun Zhang
SIGCOMM
2009
ACM
15 years 4 months ago
Game action based power management for multiplayer online game
Current mobile devices embrace a wide range of functionalities including high speed network support, hardware accelerated 3D graphics, and multimedia capabilities. These capabilit...
Bhojan Anand, Akkihebbal L. Ananda, Mun Choon Chan...
« Prev « First page 1847 / 1881 Last » Next »