Sciweavers

65 search results - page 5 / 13
» percom 2008
Sort
View
PERCOM
2008
ACM
15 years 11 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar
PERCOM
2008
ACM
15 years 11 months ago
Cardinality Estimation for Large-scale RFID Systems
Counting or estimating the number of tags is crucial for large-scale RFID systems. The use of multiple readers was recently proposed to improve the efficiency and effectiveness in ...
Chen Qian, Hoilun Ngan, Yunhao Liu
PERCOM
2008
ACM
15 years 11 months ago
Efficient Retargeting of Generated Device User-Interfaces
Many pervasive computing systems have been built for using mobile computers to interact with networked devices. To deploy a device's user-interface, several systems dynamical...
Olufisayo Omojokun, Prasun Dewan
PERCOM
2008
ACM
15 years 11 months ago
Non-anchored Unified Naming for Ubiquitous Computing Environments
Users and developers require some way to identify by human readable names the many resources that comprise a ubiquitous computing environment. In addition, naming in such environm...
Yoo Chul Chung, Dongman Lee
PERCOM
2008
ACM
15 years 11 months ago
A Survey of Current Directions in Service Placement in Mobile Ad-hoc Networks
Service placement deals with the problem of selecting which node in a network is most suitable for hosting a service that responds to queries from other nodes. Optimally placing s...
Georg Wittenburg, Jochen H. Schiller