Sciweavers

856 search results - page 88 / 172
» Location Management in Pervasive Systems
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
14 years 25 days ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
WWW
2003
ACM
14 years 9 months ago
High-performance spatial indexing for location-based services
Much attention has been accorded to Location-Based Services and location tracking, a necessary component in active, trigger-based LBS applications. Tracking the location of a larg...
Jussi Myllymaki, James H. Kaufman
MOBISYS
2009
ACM
14 years 9 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
MATA
2001
Springer
177views Communications» more  MATA 2001»
14 years 1 months ago
A Self-adaptable Agent System for Efficient Information Gathering
As networks become all-pervasive the importance of efficient information gathering for purposes such as monitoring, fault diagnosis, and performance evaluation can only increase. E...
Antonio Liotta, George Pavlou, Graham Knight
OSDI
2008
ACM
14 years 9 months ago
Avoiding File System Micromanagement with Range Writes
We introduce range writes, a simple but powerful change to the disk interface that removes the need for file system micromanagement of block placement. By allowing a file system t...
Ashok Anand, Sayandeep Sen, Andrew Krioukov, Flore...