Sciweavers

1054 search results - page 27 / 211
» From Mobility Management to Connectivity Management
Sort
View
IJWIN
2006
119views more  IJWIN 2006»
13 years 7 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
ICDE
2008
IEEE
182views Database» more  ICDE 2008»
14 years 9 months ago
SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services
In a mobile service scenario, users query a server for nearby points of interest but they may not want to disclose their locations to the service. Intuitively, location privacy may...
Man Lung Yiu, Christian S. Jensen, Xuegang Huang, ...
ACISP
2005
Springer
14 years 1 months ago
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management
Abstract. RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, ...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
APNOMS
2006
Springer
13 years 11 months ago
A Seamless Service Management with Context-Aware Handoff Scheme in Ubiquitous Computing Environment
Abstract. Despite the importance of seamless connectivity in ubiquitous computing, research for seamless connectivity has not been considered properly. To provide seamless connecti...
Tae-Hoon Kang, Chung-Pyo Hong, Won-Joo Jang, Shin-...
ICC
2000
IEEE
241views Communications» more  ICC 2000»
14 years 2 days ago
Power Management for Throughput Enhancement in Wireless Ad-Hoc Networks
—In this paper we introduce the notion of power management within the context of wireless ad-hoc networks. More specifically, we investigate the effects of using different trans...
Tamer A. ElBatt, Srikanth V. Krishnamurthy, Dennis...