Sciweavers

17082 search results - page 375 / 3417
» Abstractions for Mobile Computation
Sort
View
MDM
2007
Springer
106views Communications» more  MDM 2007»
15 years 11 months ago
Protecting Moving Trajectories with Dummies
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee
GLOBECOM
2006
IEEE
15 years 10 months ago
Integrated Scheduling of Application- and Network-Layer Tasks in Delay-Tolerant MANETs
Abstract— Natural or man-made disasters can partition networks while threatening human lives. Because conventional Mobile Ad-Hoc Networks (MANETs) cannot route messages across pa...
José Carlos Brustoloni, Sherif M. Khattab, ...
PUC
2008
116views more  PUC 2008»
15 years 4 months ago
Prototypical implementation of location-aware services based on a middleware architecture for super-distributed RFID tag infrast
of the hardware abstraction layer and of selected core middleware services. The latter enable a mobile device to store and retrieve data and position information in physical places...
Jürgen Bohn
WOWMOM
2009
ACM
146views Multimedia» more  WOWMOM 2009»
15 years 11 months ago
When opportunity proceeds from autonomy: A tour-based architecture for disconnected mobile sensors
We consider the case of sparse mobile sensors deployed to implement missions in challenging environments. This paper explores a notion of tour networks that is well suited to circ...
Michel Charpentier, Radim Bartos, Swapnil Bhatia
ICDCSW
2006
IEEE
15 years 10 months ago
On the Use of Nodes with Controllable Mobility for Conserving Power in MANETs
We explore the idea of using relay nodes with controllable mobility as intermediate hops for reducing the power consumption in a mobile ad hoc network (MANET). We formulate the re...
Eashwar R. Chittimalla, Aravindhan Venkateswaran, ...