Sciweavers

744 search results - page 95 / 149
» Location Management Based on the Mobility Patterns of Mobile...
Sort
View
WMASH
2005
ACM
14 years 2 months ago
A multimedia guidebook implementation using a bluetooth wireless information point network
This paper describes the implementation of a Bluetooth Village Guide Book (VGB) scenario for use in the Kelvin Grove Urban Village located in Brisbane, Australia. An Information P...
Matthew D'Souza, Adam Postula, Neil Bergmann, Mont...
ACMICEC
2004
ACM
205views ECommerce» more  ACMICEC 2004»
14 years 2 months ago
M-Modeler: a framework implementation for modeling m-commerce applications
At the present time, the use of mobile technology in business, is becoming an opportunity to generate competitive advantages within organization environments. Mobile technology he...
Ana Hilda Morales-Aranda, Oscar Mayora-Ibarra, San...
AP2PC
2003
Springer
14 years 2 months ago
K-Trek: A Peer-to-Peer Approach to Distribute Knowledge in Large Environments
In this paper, we explore an architecture, called K-Trek, that enables mobile users to travel across knowledge distributed over large geographical areas (ranging from large public ...
Paolo Busetta, Paolo Bouquet, Giordano Adami, Matt...
MOBIHOC
2003
ACM
14 years 9 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
ICSNC
2007
IEEE
14 years 3 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...