Sciweavers

2612 search results - page 312 / 523
» Mobile Processes and Termination
Sort
View
PE
2006
Springer
193views Optimization» more  PE 2006»
15 years 4 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
CN
2004
107views more  CN 2004»
15 years 4 months ago
A multicriteria handoff decision scheme for the next generation tactical communications systems
In this paper a novel handoff decision algorithm for the mobile subsystem of tactical communications systems is introduced. In this algorithm, handoff decision metrics are: receiv...
Tolga Onel, Cem Ersoy, Erdal Cayirci, Gerard Parr
112
Voted
PERVASIVE
2007
Springer
15 years 4 months ago
Mobiscopes for Human Spaces
The proliferation of affordable mobile devices with processing and sensing capabilities, together with the rapid growth in ubiquitous network connectivity, herald an era of Mobisc...
Tarek F. Abdelzaher, Yaw Anokwa, Péter Boda...
GIS
2010
ACM
15 years 3 months ago
Querying the future of spatio-temporal objects
Since navigation systems and tracking devices are becoming ubiquitous in our daily life, the development of efficient methods for processing massive sets of mobile objects are of ...
Philip Schmiegelt, Bernhard Seeger
161
Voted
MM
2010
ACM
164views Multimedia» more  MM 2010»
15 years 3 months ago
Visual search applications for connecting published works to digital material
Visual search connects physical (offline) objects with (online) digital media. Using objects from the environment, like newspapers, magazines, books and posters, we can retrieve s...
Jamey Graham, Jorge Moraleda, Jonathan J. Hull, Ti...