Sciweavers

683 search results - page 113 / 137
» Exploiting Logical Mobility in Mobile Computing Middleware
Sort
View
GIS
2008
ACM
13 years 9 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray
CORR
2007
Springer
93views Education» more  CORR 2007»
13 years 8 months ago
Opportunistic Scheduling and Beamforming for MIMO-SDMA Downlink Systems with Linear Combining
Opportunistic scheduling and beamforming schemes are proposed for multiuser MIMO-SDMA downlink systems with linear combining in this work. Signals received from all antennas of ea...
Man-On Pun, Visa Koivunen, H. Vincent Poor
EEMMAS
2007
Springer
14 years 2 months ago
Engineering Contextual Information for Pervasive Multiagent Systems
Multiagent systems for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises th...
Gabriella Castelli, Marco Mamei, Franco Zambonelli
SIGMETRICS
2011
ACM
140views Hardware» more  SIGMETRICS 2011»
12 years 11 months ago
On the stability and optimality of universal swarms
Recent work on BitTorrent swarms has demonstrated that a bandwidth bottleneck at the seed can lead to the underutilization of the aggregate swarm capacity. Bandwidth underutilizat...
Xia Zhou, Stratis Ioannidis, Laurent Massouli&eacu...
HUC
2011
Springer
12 years 8 months ago
Enabling large-scale human activity inference on smartphones using community similarity networks (csn)
Sensor-enabled smartphones are opening a new frontier in the development of mobile sensing applications. The recognition of human activities and context from sensor-data using cla...
Nicholas D. Lane, Ye Xu, Hong Lu, Shaohan Hu, Tanz...