Sciweavers

123 search results - page 19 / 25
» Cocktail Party on the Mobile
Sort
View
TWC
2008
147views more  TWC 2008»
13 years 6 months ago
Asymmetric cooperation among wireless relays with linear precoding
Wireless relays extend coverage, improve spectral efciency, and enhance reliability and rates of wireless cellular communication systems. In this work, we introduce the fundamental...
Natasha Devroye, Neelesh B. Mehta, Andreas F. Moli...
DIM
2005
ACM
13 years 8 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
14 years 6 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
CHI
2005
ACM
14 years 7 months ago
Giving the caller the finger: collaborative responsibility for cellphone interruptions
We present a system in which a cell phone decides whether to ring by accepting votes from the others in a conversation with the called party. When a call comes in, the phone first...
Stefan Marti, Chris Schmandt
IFIP
2009
Springer
14 years 1 months ago
A Calculus of Trustworthy Ad Hoc Networks
We propose a process calculus for mobile ad hoc networks which embodies a behaviour-based multilevel decentralised trust model. Our trust model supports both direct trust, by monit...
Massimo Merro, Eleonora Sibilio