Sciweavers

1610 search results - page 52 / 322
» A Transaction Model for Mobile Computing
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
CCGRID
2001
IEEE
14 years 21 days ago
Supporting Disconnectedness-Transparent Information Delivery for Mobile and Invisible Computing
As computing devices become ubiquitous and increasingly mobile, it is becoming apparent that the directed peerto-peer communication model has shortcomings for many forms of distri...
Peter Sutton, Rhys Arkins, Bill Segall
EUC
2004
Springer
14 years 2 months ago
Location-Aware Information Retrieval for Mobile Computing
Abstract. With the knowledge about their locations, mobile users are able to issue location-dependent queries. Most of existing approaches focus on how to obtain the information ab...
Jiannong Cao, Kwok Ming Chan, Geoffrey Yu-Kai Shea...
ICWMC
2006
IEEE
14 years 3 months ago
Mobility Models for UAV Group Reconnaissance Applications
In MANET research the mobility of the nodes is often described using standard synthetic models. Given a particular application, e.g. networks of unmanned aerial vehicles (UAVs) pe...
Erik Kuiper, Simin Nadjm-Tehrani
JUCS
2008
248views more  JUCS 2008»
13 years 9 months ago
Cultural Factors in a Mobile Phone Adoption and Usage Model
: In human-computer interaction and computing, mobile phone usage is mostly addressed from a feature-driven perspective, i.e. which features do a certain user group use, and/or a u...
Judy van Biljon, Paula Kotzé