Sciweavers

589 search results - page 114 / 118
» Evaluating mobile phones as risk information providers
Sort
View
PERVASIVE
2005
Springer
14 years 1 months ago
Towards Massively Multi-user Augmented Reality on Handheld Devices
Augmented Reality (AR) can naturally complement mobile computing on wearable devices by providing an intuitive interface to a three-dimensional information space embedded within ph...
Daniel Wagner, Thomas Pintaric, Florian Ledermann,...
CCR
2006
90views more  CCR 2006»
13 years 7 months ago
CRAWDAD: a community resource for archiving wireless data at Dartmouth
Wireless network researchers are seriously starved for data about how real users, applications, and devices use real networks under real network conditions. CRAWDAD, a Community R...
Jihwang Yeo, David Kotz, Tristan Henderson
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 7 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
TOCS
2011
111views more  TOCS 2011»
13 years 2 months ago
SEATTLE: A Scalable Ethernet Architecture for Large Enterprises
IP networks today require massive effort to configure and manage. Ethernet is vastly simpler to manage, but does not scale beyond small local area networks. This paper describes ...
Changhoon Kim, Matthew Caesar, Jennifer Rexford
ISCIS
2005
Springer
14 years 1 months ago
Admission Control for Multicast Routing with Quality of Service in Ad Hoc Networks
Ad hoc networks, being able to organize themselves without user intervention, can easily provide their users with mobility, multimedia support and group communication. However, the...
Kaan Bür, Cem Ersoy