Sciweavers

159 search results - page 28 / 32
» Impromptu: Managing Networked Audio Applications for Mobile ...
Sort
View
SOSP
2003
ACM
14 years 4 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...
KDD
2008
ACM
147views Data Mining» more  KDD 2008»
14 years 8 months ago
Mobile call graphs: beyond power-law and lognormal distributions
We analyze a massive social network, gathered from the records of a large mobile phone operator, with more than a million users and tens of millions of calls. We examine the distr...
Mukund Seshadri, Sridhar Machiraju, Ashwin Sridhar...
EUROPAR
2006
Springer
13 years 11 months ago
Context Awareness: An Experiment with Hoarding
Abstract. Computer mobility allows people to use computers in varied and changing environments. This variability forces applications to adapt thus requiring awareness of the comput...
João Garcia, Luís Veiga, Paulo Ferre...
MIDDLEWARE
2004
Springer
14 years 28 days ago
Adaptive resource discovery for ubiquitous computing
The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristi...
Rae Harbird, Stephen Hailes, Cecilia Mascolo
CHI
2008
ACM
14 years 8 months ago
The associative pda 2.0
In this paper I describe the Associative PDA 2.0, a mobile system for Personal Information Management (PIM), based on an associative information network. In addition to associate ...
Eileen Falke