Although mobile services can be used ubiquitously, their employment and the interaction with them are still restricted by the constraints of mobile devices. In order to facilitate...
Gregor Broll, Sven Siorpaes, Enrico Rukzio, Massim...
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
The mass market of wireless devices is pushing towards service provisioning over dense Mobile Ad-hoc NETworks (MANETs), i.e., limited spatial regions, such as university campuses,...
Paolo Bellavista, Antonio Corradi, Eugenio Magistr...
In this paper, we propose a simple yet effective method of identifying traffic conditions on surface streets given location traces collected from on-road vehicles--this requires o...
We propose the Robust Overlay Architecture for Mobility (ROAM) to provide seamless mobility for Internet hosts. ROAM is built on top of the Internet Indirection Infrastructure (i3...
Shelley Zhuang, Kevin Lai, Ion Stoica, Randy H. Ka...