Sciweavers

5446 search results - page 1040 / 1090
» Mobile computing
Sort
View
CONEXT
2009
ACM
13 years 9 months ago
The age of impatience: optimal replication schemes for opportunistic networks
: We study mobile P2P content dissemination schemes which leverage the local dedicated caches provided by hand-held devices (e.g., smart-phones, PDAs) and opportunistic contacts be...
Joshua Reich, Augustin Chaintreau
JPDC
2006
148views more  JPDC 2006»
13 years 8 months ago
Efficient algorithm for placing a given number of base stations to cover a convex region
In the context of mobile communication, an efficient algorithm for the base-station placement problem is developed in this paper. The objective is to place a given number of base-...
Gautam K. Das, Sandip Das, Subhas C. Nandy, Bhaban...
CLUSTER
2004
IEEE
13 years 8 months ago
Resource Management for Ad-Hoc Wireless Networks with Cluster Organization
Boosted by technology advancements, government and commercial interest, ad-hoc wireless networks are emerging as a serious platform for distributed mission-critical applications. G...
Ionut Cardei, Srivatsan Varadarajan, Allalaghatta ...
WISEC
2010
ACM
13 years 6 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
MOBISYS
2011
ACM
12 years 11 months ago
Indoor localization without infrastructure using the acoustic background spectrum
We introduce a new technique for determining a mobile phone’s indoor location even when Wi-Fi infrastructure is unavailable or sparse. Our technique is based on a new ambient so...
Stephen P. Tarzia, Peter A. Dinda, Robert P. Dick,...
« Prev « First page 1040 / 1090 Last » Next »