More and more music is being made available to the music listener today, while people have their favorite music on their mobile players. In this paper, we investigate an approach t...
New challenging deployment scenarios are integrating mobile devices with limited and heterogeneous capabilities that roam among wireless access localities during service provisioni...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
A number of approaches for capturing and processing location information of mobile users have been proposed in the past; however, only with the latest advances in the handset tech...
This paper presents algorithms, simulations, and empirical results of a system that finds relative tag positions in 3D space using a new approach called “mobile infrastructure....