Sciweavers

308 search results - page 9 / 62
» Accessing Ubiquitous Services Using Smart Phones
Sort
View
RTCSA
2007
IEEE
14 years 1 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
AINA
2007
IEEE
14 years 1 months ago
Experimental analysis of peer-to-peer streaming in cellular networks
In this paper, we study the adequacy of applying peer-topeer techniques to mobile networks by conducting a series of experiments using smart phones as peers. We measure important ...
Almudena Diaz-Zayas, Pedro Merino, Laura Panizo, A...
PERCOM
2007
ACM
14 years 7 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
PERCOM
2003
ACM
14 years 7 months ago
Smart Identification Frameworks for Ubiquitous Computing Applications
Abstract. We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe su...
Friedemann Mattern, Kay Römer, Thomas Dü...
WWW
2006
ACM
14 years 8 months ago
Designing an architecture for delivering mobile information services to the rural developing world
Paper plays a crucial role in many developing world information practices. However, paper-based records are inefficient, error-prone and difficult to aggregate. Therefore we need ...
Tapan S. Parikh, Edward D. Lazowska