Sciweavers

7265 search results - page 1419 / 1453
» Mobile human-computer interaction
Sort
View
ICCCN
2008
IEEE
14 years 4 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
ISMAR
2008
IEEE
14 years 4 months ago
Virtual redlining for civil engineering in real environments
Field workers of utility companies are regularly engaged in outdoor tasks such as network planning, maintenance and inspection of underground infrastructure. Redlining is the term...
Gerhard Schall, Erick Méndez, Dieter Schmal...
TRIDENTCOM
2008
IEEE
14 years 4 months ago
DRIVE: a reconfigurable testbed for advanced vehicular services and communications
This paper introduces DRIVE, a reconfigurable demonstrator that will allow for experimental validation of vehicular networking research, as well as proof of concept and realistic ...
Carolina Pinart, Pilar Sanz, Iván Lequerica...
VTC
2008
IEEE
125views Communications» more  VTC 2008»
14 years 4 months ago
Wireless Broadband Services using Smart Caching
— Broadband access for all will be a key functionality in future mobile radio networks. Depending on the length and the characteristic of the radio wave propagation the performan...
Stephan Goebbels
WIMOB
2008
IEEE
14 years 4 months ago
A Distributed Scheduling Algorithm with QoS Provisions in Multi-hop Wireless Mesh Networks
—Multi-hop wireless mesh networks (WMNs) are considered a promising technology to backhaul heterogeneous data traffic from wireless access networks to the wired Internet. WMNs a...
Chi Harold Liu, Athanasios Gkelias, Yun Hou, Kin K...
« Prev « First page 1419 / 1453 Last » Next »