Sciweavers

6662 search results - page 1201 / 1333
» Mobile and Ubiquitous Computing
Sort
View
JCP
2006
120views more  JCP 2006»
13 years 10 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
PERVASIVE
2008
Springer
13 years 10 months ago
Cooperative Techniques Supporting Sensor-Based People-Centric Inferencing
Abstract. People-centric sensor-based applications targeting mobile device users offer enormous potential. However, learning inference models in this setting is hampered by the lac...
Nicholas D. Lane, Hong Lu, Shane B. Eisenman, Andr...
PERVASIVE
2008
Springer
13 years 10 months ago
Context-aware routing in wireless mesh networks
Wireless mesh networks promise to deliver resilient connectivity among network nodes, allowing data to be relayed seamlessly between mobile clients and infrastructure. Routing is ...
Peizhao Hu, Marius Portmann, Ricky Robinson, Jadwi...
PERVASIVE
2008
Springer
13 years 10 months ago
A fair and energy-efficient topology control protocol for wireless sensor networks
In energy constrained wireless sensor networks, energy conservation techniques are to be applied in order to maximize the system lifetime. We tackle the problem of increasing netw...
Rami Mochaourab, Waltenegus Dargie
CIE
2005
Springer
13 years 10 months ago
Atomic actions -- molecular experience: theory of pervasive gaming
The attempt of this paper is to describe and analyze the formalisms of pervasive games and pervasive gaming (PG). As the title indicates, PG consists of atomic entities that never...
Bo Kampmann Walther
« Prev « First page 1201 / 1333 Last » Next »