Sciweavers

523 search results - page 83 / 105
» A Cross-Layered Peer-to-Peer Architecture for Wireless Mobil...
Sort
View
PERCOM
2004
ACM
14 years 7 months ago
Denial-of-Service Attacks on Battery-powered Mobile Computers
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
DAC
1997
ACM
13 years 11 months ago
Tools and Methodologies for Low Power Design
-- Designing for low power has become increasingly important in a wide variety of applications, including wireless telephony, mobile computing, high performance computing, and high...
Jerry Frenkil
MOBICOM
2010
ACM
13 years 7 months ago
Directional antenna diversity for mobile devices: characterizations and solutions
We report a first-of-its-kind realization of directional transmission for smartphone-like mobile devices using multiple passive directional antennas, supported by only one RF chai...
Ardalan Amiri Sani, Lin Zhong, Ashutosh Sabharwal
CONEXT
2009
ACM
13 years 8 months ago
Cool-Tether: energy efficient on-the-fly wifi hot-spots using mobile phones
We consider the problem of providing ubiquitous yet affordable Internet connectivity to devices at home, at work, and on the move. In this context, we take advantage of two signif...
Ashish Sharma, Vishnu Navda, Ramachandran Ramjee, ...
AINA
2007
IEEE
14 years 1 months ago
Multi-Stage Real Time Health Monitoring via ZigBee in Smart Homes
We present a framework for a wireless health monitoring system within a smart home using ZigBee technology. Vital signals are collected and processed using a 3-tiered architecture...
S. Dagtas, G. Pekhteryev, Zafer Sahinoglu