Sciweavers

744 search results - page 45 / 149
» Location Management Based on the Mobility Patterns of Mobile...
Sort
View
JCM
2006
99views more  JCM 2006»
13 years 9 months ago
VIP (VHE in Mobile IP Networks) Architecture
In this study we propose a new architecture named VIP (VHE in mobile IP networks) which guarantees authorized user access and user mobility management. The main goal is to bring th...
Octavio Ramirez Rojas, Jalel Ben-Othman, Safouane ...
TDSC
2011
13 years 4 months ago
An Obfuscation-Based Approach for Protecting Location Privacy
—The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the phys...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
ICWE
2010
Springer
13 years 7 months ago
Designing Context-Aware Interactions for Task-Based Applications
Since contextual information has potential to improve task-based applications, we provide an approach for integrating contextual information in task-based applications by consideri...
Pablo Muñoz, Pau Giner, Miriam Gil
COMCOM
2008
112views more  COMCOM 2008»
13 years 9 months ago
A game-theoretic analysis of wireless access point selection by mobile users
A user located in a congested area of a wireless LAN may benefit by moving to a less-crowded area and using a less-loaded access point. This idea has gained attention from research...
Kimaya Mittal, Elizabeth M. Belding, Subhash Suri
UIC
2009
Springer
14 years 3 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...