Sciweavers

6955 search results - page 1094 / 1391
» Mobile Recommender Systems
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
15 years 4 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
163
Voted
AUTOMATICA
2007
124views more  AUTOMATICA 2007»
15 years 4 months ago
Motion planning in uncertain environments with vision-like sensors
In this work we present a methodology for intelligent path planning in an uncertain environment using vision like sensors, i.e., sensors that allow the sensing of the environment ...
Suman Chakravorty, John L. Junkins
129
Voted
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 4 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
161
Voted
CAL
2007
15 years 4 months ago
Chameleon: A High Performance Flash/FRAM Hybrid Solid State Disk Architecture
—Flash memory solid state disk (SSD) is gaining popularity and replacing hard disk drive (HDD) in mobile computing systems such as ultra mobile PCs (UMPCs) and notebook PCs becau...
Jinhyuk Yoon, Eyee Hyun Nam, Yoon Jae Seong, Hongs...
IJWIN
2008
126views more  IJWIN 2008»
15 years 4 months ago
IEEE 802.11 Load Balancing: An Approach for QoS Enhancement
Abstract. With the 802.11 WLAN multimedia applications (Video, Audio, realtime voice over IP,...) increasing, providing Quality of Service (QoS) support becomes very important sinc...
Issam Jabri, Nicolas Krommenacker, Thierry Divoux,...
« Prev « First page 1094 / 1391 Last » Next »