Sciweavers

21 search results - page 1 / 5
» mobisys 2005
Sort
View
MOBISYS
2005
ACM
15 years 10 months ago
Accuracy characterization for metropolitan-scale Wi-Fi localization
Yu-Chung Cheng, Yatin Chawathe, Anthony LaMarca, J...
MOBISYS
2005
ACM
15 years 10 months ago
A systems architecture for ubiquitous video
Realityflythrough is a telepresence/tele-reality system that works in the dynamic, uncalibrated environments typically associated with ubiquitous computing. By harnessing networke...
Neil J. McCurdy, William G. Griswold
MOBISYS
2005
ACM
15 years 10 months ago
Cracking the Bluetooth PIN
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used du...
Yaniv Shaked, Avishai Wool
MOBISYS
2005
ACM
15 years 10 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf
MOBISYS
2005
ACM
15 years 10 months ago
Slingshot: deploying stateful services in wireless hotspots
Given a sufficiently good network connection, even a handheld computer can run extremely resource-intensive applications by executing the demanding portions on a remote server. At...
Ya-Yunn Su, Jason Flinn