Sciweavers

11927 search results - page 2060 / 2386
» Wireless Sensor Networks
Sort
View
PERCOM
2005
ACM
16 years 4 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
113
Voted
PERCOM
2005
ACM
16 years 4 months ago
Toward Unlinkable ID Management for Multi-Service Environments
As pervasive computing environments become popular, ID devices, such as smart cards and RFID tags, introduce multi-service environments, in which a user can receive multiple servi...
Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura
PERCOM
2005
ACM
16 years 4 months ago
Hoarding Content in M-Learning Context
With the advances in mobile technologies is now possible to support learners and teachers activities on the move. We analyzed the functionalities that should be provided by a gene...
Anna Trifonova, Marco Ronchetti
PERCOM
2004
ACM
16 years 4 months ago
PCOM - A Component System for Pervasive Computing
Applications in the Pervasive Computing domain are challenged by the dynamism in which their execution environment changes, e.g. due to user mobility. As a result, applications ha...
Christian Becker, Marcus Handte, Gregor Schiele, K...
PERCOM
2004
ACM
16 years 4 months ago
Dynamic World Models from Ray-tracing
Context-aware computing systems demand an accurate and up-to-date world model which computationally represents the environment they oversee. Systems to date tend to have small-sca...
Robert K. Harle, Andy Hopper
« Prev « First page 2060 / 2386 Last » Next »