Sciweavers

1152 search results - page 65 / 231
» mobility 2009
Sort
View
119
Voted
ADHOCNETS
2009
Springer
15 years 5 months ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
ICALP
2009
Springer
15 years 7 months ago
Names Trump Malice: Tiny Mobile Agents Can Tolerate Byzantine Failures
Abstract. We introduce a new theoretical model of ad hoc mobile computing in which agents have severely restricted memory, highly unpredictable movement and no initial knowledge of...
Rachid Guerraoui, Eric Ruppert
JCDL
2009
ACM
166views Education» more  JCDL 2009»
15 years 7 months ago
Designing the reading experience for scanned multi-lingual picture books on mobile phones
This paper reports on an adaption of the existing PopoutText and ClearText display techniques to mobile phones. It explains the design rationale for a freely available iPhone appl...
Benjamin B. Bederson, Alexander J. Quinn, Allison ...
79
Voted
SIGCOMM
2009
ACM
15 years 7 months ago
Self management of a mobile thin client service
Mobile thin client computing is an enabler for the execution of demanding applications from mobile handhelds. In thin client computing, the application is executed on remote serve...
Lien Deboosere, Bert Vankeirsbilck, Pieter Simoens...
PERVASIVE
2009
Springer
15 years 7 months ago
Enabling Pervasive Collaboration with Platform Composition
Abstract. Emerging pervasive computing technologies present many opportunities to aid ad-hoc collocated group collaboration. To better understand ad-hoc collaboration using pervasi...
Trevor Pering, Roy Want, Barbara Rosario, Shivani ...