Sciweavers

1103 search results - page 189 / 221
» Connection service and management using mobile agents
Sort
View
TMC
2008
159views more  TMC 2008»
13 years 9 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
ICSE
2000
IEEE-ACM
14 years 2 months ago
Software needs engineering: a position paper
When the general press refers to `software' in its headlines, then this is often not to relate a success story, but to expand on yet another `software-risk-turned-problem-sto...
Jane Grimson, Hans-Jürgen Kugler
INFOCOM
2010
IEEE
13 years 9 months ago
PeopleRank: Social Opportunistic Forwarding
— In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes t...
Abderrahmen Mtibaa, Martin May, Christophe Diot, M...
COMSWARE
2006
IEEE
14 years 2 months ago
M2MC: Middleware for many to many communication over broadcast networks
M2MC is a new distributed computing middleware designed to support collaborative applications running on devices connected by broadcast networks. Examples of such networks are wire...
Chaitanya Krishna Bhavanasi, Sridhar Iyer
TPDS
2002
127views more  TPDS 2002»
13 years 10 months ago
Adaptive Bandwidth Reservation and Admission Control in QoS-Sensitive Cellular Networks
How to keep the probability of hand-off drops within a prespecified limit is a very important Quality-of-Service (QoS) issue in cellular networks because mobile users should be abl...
Sunghyun Choi, Kang G. Shin