Sciweavers

2347 search results - page 390 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
HICSS
2008
IEEE
156views Biometrics» more  HICSS 2008»
14 years 2 months ago
Mobile Advertising in Different Stages of Development: A Cross-Country Comparison of Consumer Attitudes
Mobile technologies imply many opportunities for marketing, in particular a direct communication with consumers without time or location barriers. However, some aspects of mobile ...
Parissa Haghirian, Maria Madlberger, Akihiro Inoue
ICDM
2008
IEEE
185views Data Mining» more  ICDM 2008»
14 years 2 months ago
Clustering Uncertain Data Using Voronoi Diagrams
We study the problem of clustering uncertain objects whose locations are described by probability density functions (pdf). We show that the UK-means algorithm, which generalises t...
Ben Kao, Sau Dan Lee, David W. Cheung, Wai-Shing H...
ICPADS
2008
IEEE
14 years 2 months ago
Textures in Second Life: Measurement and Analysis
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
Huiguang Liang, Mehul Motani, Wei Tsang Ooi
INFOCOM
2008
IEEE
14 years 2 months ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang
INFOCOM
2008
IEEE
14 years 2 months ago
Constrained Relay Node Placement in Wireless Sensor Networks to Meet Connectivity and Survivability Requirements
— The relay node placement problem for wireless sensor networks is concerned with placing a minimum number of relay nodes into a wireless sensor network to meet certain connectiv...
Satyajayant Misra, Seung Don Hong, Guoliang Xue, J...