Sciweavers

3016 search results - page 390 / 604
» Disappearing mobile devices
Sort
View
VTC
2007
IEEE
14 years 5 months ago
Time-Stable Geocast in Intermittently Connected IEEE 802.11 MANETs
— By geocast protocols, information can be directly disseminated to users of mobile devices who currently reside in selected geographical regions. Time-stable geocast protocols e...
Sven D. Hermann, C. Michl, Adam Wolisz
HUC
2007
Springer
14 years 4 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
ICMB
2005
IEEE
79views Business» more  ICMB 2005»
14 years 4 months ago
Identity Management in Vertical Handovers for UMTS-WLAN Networks
One motivation of mobile Next-Generation Networks (NGN) is the ubiquitous computing abilities, which provide automatic handovers for any moving computing devices in a globally net...
Mo Li, Kumbesan Sandrasegaran, Xiaoan Huang
IUI
2005
ACM
14 years 4 months ago
Doubleshot: an interactive user-aided segmentation tool
In this paper, we describe an intelligent user interface designed for camera phones to allow mobile users to specify the object of interest in the scene simply by taking two pictu...
Tom Yeh, Trevor Darrell
ICNP
2002
IEEE
14 years 3 months ago
Power Mode Scheduling for Ad Hoc Networks
An ad hoc network is a group of mobile wireless nodes that cooperatively form a network among themselves without any fixed infrastructure. Increasingly, power consumption within ...
Santashil PalChaudhuri, David B. Johnson