Sciweavers

744 search results - page 64 / 149
» Location Management Based on the Mobility Patterns of Mobile...
Sort
View
ACSAC
1998
IEEE
14 years 1 months ago
How to Increase Security in Mobile Networks by Anomaly Detection
The increasing complexity of cellular radio networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse both by in- a...
Roland Büschkes, Dogan Kesdogan, Peter Reichl
SSD
2007
Springer
189views Database» more  SSD 2007»
14 years 3 months ago
Collaborative Spatial Data Sharing Among Mobile Lightweight Devices
Abstract. Mobile devices are increasingly being equipped with wireless peerto-peer (P2P) networking interfaces, rendering the sharing of data among mobile devices feasible and bene...
Zhiyong Huang, Christian S. Jensen, Hua Lu, Beng C...
IFIP8
2004
13 years 11 months ago
Towards Highly Adaptive Services for Mobile Computing
: The heterogeneity of device capabilities, network conditions and user contexts that is associated with mobile computing has emphasized the need for more advanced forms of adaptat...
Alessandra Agostini, Claudio Bettini, Nicolò...
SENSYS
2010
ACM
13 years 7 months ago
The Jigsaw continuous sensing engine for mobile phone applications
Supporting continuous sensing applications on mobile phones is challenging because of the resource demands of long-term sensing, inference and communication algorithms. We present...
Hong Lu, Jun Yang, Zhigang Liu, Nicholas D. Lane, ...
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
12 years 1 days ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang