Sciweavers

17082 search results - page 167 / 3417
» Abstractions for Mobile Computation
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
CCGRID
2001
IEEE
14 years 26 days ago
Supporting Disconnectedness-Transparent Information Delivery for Mobile and Invisible Computing
As computing devices become ubiquitous and increasingly mobile, it is becoming apparent that the directed peerto-peer communication model has shortcomings for many forms of distri...
Peter Sutton, Rhys Arkins, Bill Segall
PUC
2002
80views more  PUC 2002»
13 years 8 months ago
Overcoming the Lack of Screen Space on Mobile Computers
One difficulty for interface design on mobile computers is lack of screen space caused by their small size. This paper describes a small pilot study and two formal experiments tha...
Stephen A. Brewster
SSS
2005
Springer
132views Control Systems» more  SSS 2005»
14 years 2 months ago
Self-stabilizing Mobile Node Location Management and Message Routing
We present simple algorithms for achieving self-stabilizing location management and routing in mobile ad-hoc networks. While mobile clients may be susceptible to corruption and sto...
Shlomi Dolev, Limor Lahiani, Nancy A. Lynch, Tina ...
RTCSA
1999
IEEE
14 years 1 months ago
Adaptive Data Broadcast Strategy for Transactions with Multiple Data Requests in Mobile Computing Environments
Data Broadcast in mobile environments has received much attention in recent years and a large number of algorithms proposed. However, existing work in the literature only assume a ...
Joe Chun-Hung Yuen, Edward Chan, Kam-yiu Lam