Sciweavers

6662 search results - page 1106 / 1333
» Mobile and Ubiquitous Computing
Sort
View
WMCSA
2003
IEEE
15 years 10 months ago
Selecting Devices for Aggregation
As intelligent devices become affordable and wireless infrastructure becomes pervasive, the potential to combine, or aggregate, device functionality to provide a user with a bette...
Rajnish Kumar, Vahe Poladian, Ira Greenberg, Alan ...
APLAS
2003
ACM
15 years 10 months ago
Controlling and Optimizing the Usage of One Resource
This paper studies the problem of resource availability in the context of mobile code for embedded systems such as smart cards. It presents an architecture dedicated to controlling...
Antoine Galland, Mathieu Baudet
DIGRA
2003
Springer
15 years 10 months ago
A Real Little Game: The Pinocchio Effect in Pervasive Play
Mobile digital technologies and networks have fueled a recent proliferation of opportunities for pervasive play in everyday spaces. In this paper, I examine how players negotiate ...
Jane McGonigal
ICALP
2003
Springer
15 years 9 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
ICPPW
2002
IEEE
15 years 9 months ago
System Services for Implementing Ad-Hoc Routing Protocols
This paper explores several systems issues regarding the implementation of routing protocols for mobile ad-hoc networks. It proclaims that support for on-demand routing is insufï¬...
Vikas Kawadia, Yongguang Zhang, Binita Gupta
« Prev « First page 1106 / 1333 Last » Next »