Sciweavers

744 search results - page 37 / 149
» Location Management Based on the Mobility Patterns of Mobile...
Sort
View
INFOCOM
2011
IEEE
13 years 20 days ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...
ESA
2007
Springer
105views Algorithms» more  ESA 2007»
14 years 1 months ago
Finding Mobile Data: Efficiency vs. Location Inaccuracy
A token is hidden in one out of n boxes following some known probability distribution and then all the boxes are locked. The goal of a searcher is to find the token in at most D n...
Amotz Bar-Noy, Joanna Klukowska
PERCOM
2008
ACM
13 years 9 months ago
The sensor internet at work: Locating everyday items using mobile phones
We present a system for monitoring and locating everyday items using mobile phones. The system is based on phones which are enhanced with the capability to detect electronically t...
Christian Frank, Philipp Bolliger, Friedemann Matt...
ICDE
2003
IEEE
157views Database» more  ICDE 2003»
14 years 10 months ago
Energy Efficient Index for Querying Location-Dependent Data in Mobile Broadcast Environments
We are witnessing in recent years growing interest for location-dependent information services among mobile users. This paper examines the issue of processing locationdependent qu...
Jianliang Xu, Baihua Zheng, Wang-Chien Lee, Dik Lu...
ICC
2007
IEEE
14 years 3 months ago
Enhancing the Accuracy of Position Information through Superposition of Location Server Data
— The localization of a mobile device is of essential need in order to provide location based services to the users, e.g. in an emergency situation. Several mechanisms have been ...
Sven D. Hermann, Adam Wolisz, Michel Sortais