Sciweavers

500 search results - page 84 / 100
» Location privacy in wireless personal area networks
Sort
View
ICDE
2007
IEEE
144views Database» more  ICDE 2007»
14 years 1 months ago
Greedy Cache Management Techniques for Mobile Devices
Mobile devices are configured with one or more wireless cards that provide limited radio-range and unreliable transmission. These energy-constrained devices are configured with ...
Shahram Ghandeharizadeh, Shahin Shayandeh
MOBISYS
2006
ACM
14 years 7 months ago
Efficient and transparent dynamic content updates for mobile clients
We introduce a novel infrastructure supporting automatic updates for dynamic content browsing on resource constrained mobile devices. Currently, the client is forced to continuous...
Trevor Armstrong, Olivier Trescases, Cristiana Amz...
ISCC
2002
IEEE
120views Communications» more  ISCC 2002»
14 years 15 days ago
UMTS-TDD: a solution for internetworking Bluetooth piconets in indoor environments
–– The last few years have seen the evolution of telecommunications from the classic architectures, mainly based on static and wired structures, to the new mobile solutions bas...
Mario Gerla, Yeng-Zhong Lee, Rohit Kapoor, Ted Tae...
MOBIQUITOUS
2008
IEEE
14 years 2 months ago
Exploiting Schelling behavior for improving data accessibility in mobile peer-to-peer networks
In 1969, Thomas Schelling proposed one of the most cited models in economics to explain how similar people (e.g. people with the same race, education, community) group together in...
Long Vu, Klara Nahrstedt, Matthias Hollick
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 1 months ago
Study of Best-Effort VoIP Handovers between WLAN and EVDO Networks
The IEEE 802.11 based Wireless LANs (WLANs) have emerged as a viable technology for supporting real-time applications such as Voice over IP (VoIP). Even the Personal Digital Assist...
Amit P. Jardosh, Rajeev Koodli, Tat Chan