Sciweavers

637 search results - page 115 / 128
» A Privacy Enhanced Service Architecture for Mobile Users
Sort
View
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
13 years 2 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
AICT
2006
IEEE
225views Communications» more  AICT 2006»
14 years 10 days ago
Migration to 4 G: Mobile IP based Solutions
Fourth Generation (4G) is the next generation of wireless networks that will replace third Generation (3G) networks sometimes in future. 4G is intended to provide high speed, high...
K. R. Santhi, G. Senthil Kumaran
MC
2008
123views Computer Science» more  MC 2008»
13 years 11 months ago
MirrorBoard - An Interactive Billboard
Although a lot of things have changed in the field of advertising over the past few years one thing has stayed almost constant: the billboard. Billboards play an important role in...
Johannes Schönböck, Florian König, ...
SOCIALCOM
2010
13 years 8 months ago
GDC: Group Discovery Using Co-location Traces
Smart phones can collect and share Bluetooth co-location traces to identify ad hoc or semi-permanent social groups. This information, known to group members but otherwise unavailab...
Steve Mardenfeld, Daniel Boston, Susan Juan Pan, Q...
MMNS
2007
208views Multimedia» more  MMNS 2007»
13 years 11 months ago
Hybrid Overlay Networks Management for Real-Time Multimedia Streaming over P2P Networks
Recent growth of the multimedia content delivery over the Internet and the popularity of the peer-to-peer (P2P) architecture have opened new horizons for emerging novel services ov...
Mubashar Mushtaq, Toufik Ahmed