Sciweavers

152 search results - page 23 / 31
» Evaluation of Overcluttering Prevention Techniques for Mobil...
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
14 years 8 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
RTAS
2008
IEEE
14 years 2 months ago
A Hybrid DVS Scheme for Interactive 3D Games
Interactive 3D games are now widely available on a variety of mobile devices for which battery-life is a major concern. Many of these devices support voltage/frequencyscalable pro...
Yan Gu, Samarjit Chakraborty
SECON
2008
IEEE
14 years 2 months ago
Congestion-Aware Rate Adaptation in Wireless Networks: A Measurement-Driven Approach
—Traditional rate adaptation solutions for IEEE 802.11 wireless networks perform poorly in congested networks. Measurement studies show that congestion in a wireless network lead...
Prashanth Aravinda Kumar Acharya, Ashish Sharma, E...
IPSN
2010
Springer
14 years 1 months ago
Ear-phone: an end-to-end participatory urban noise mapping system
A noise map facilitates monitoring of environmental noise pollution in urban areas. It can raise citizen awareness of noise pollution levels, and aid in the development of mitigat...
Rajib Kumar Rana, Chun Tung Chou, Salil S. Kanhere...
ADHOCNOW
2007
Springer
14 years 2 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...