Sciweavers

500 search results - page 77 / 100
» Location privacy in wireless personal area networks
Sort
View
WOWMOM
2005
ACM
131views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Ad-Hoc Extensions to the 802.15.3 MAC Protocol
The paper describes the design and evaluation of AdHoc extensions to the IEEE 802.15.3 Medium Access Control (MAC) layer for Wireless Personal Area Networks (WPANs). The proposed ...
Samir Datta, Ivan Seskar, Mustafa Demirhan, Siun-C...
HRI
2010
ACM
14 years 2 months ago
Lead me by the hand: evaluation of a direct physical interface for nursing assistant robots
—When a user is in close proximity to a robot, physical contact becomes a potentially valuable channel for communication. People often use direct physical contact to guide a pers...
Tiffany L. Chen, Charles C. Kemp
WS
2004
ACM
14 years 1 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
CCS
2006
ACM
13 years 11 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
DIALM
2004
ACM
161views Algorithms» more  DIALM 2004»
13 years 11 months ago
Batch conflict resolution algorithm with progressively accurate multiplicity estimation
The wireless connectivity, essential for pervasive computing, has ephemeral character and can be used for creating ad hoc networks, sensor networks, connection with RFID tags etc....
Petar Popovski, Frank H. P. Fitzek, Ramjee Prasad