Sciweavers

107 search results - page 17 / 22
» percom 2006
Sort
View
PERCOM
2006
ACM
15 years 9 months ago
Dialing for Displays: Session Initiation Protocol for Opportunistic Augmentation
Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow ...
John J. Barton, Stina Nylander, Fopefolu Folowosel...
PERCOM
2006
ACM
15 years 9 months ago
Virtual Channel Management for Densely Deployed IEEE 802.15.4 LR-WPANs
The number of channels specified for IEEE 802.15.4 Low-Rate Wireless Personal Area Networks (LR-WPANs) is too few to operate many applications of WPANs in the same area. To overco...
Tae-Hyun Kim, Jae Yeol Ha, Sunghyun Choi, Wook Hyu...
PERCOM
2006
ACM
15 years 9 months ago
Criticality Aware Access Control Model for Pervasive Applications
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
PERCOM
2006
ACM
15 years 9 months ago
Concept for Hierarchical and Distributed Processing of Area Based Triggers
Area based triggers denote notifications being generated if a mobile client changes its spatial relation to a defined area, e.g. if it enters or leaves it. By these triggers, new ...
Sven D. Hermann, Günter Schäfer, Adam Wo...
PERCOM
2006
ACM
15 years 9 months ago
Inverted Browser: A Novel Approach towards Display Symbiosis
In this paper we introduce the Inverted Browser, a novel approach to enable mobile users to view content from their personal devices on public displays. The Inverted Browser is a ...
Mandayam T. Raghunath, Nishkam Ravi, Marcel-Catali...