Sciweavers

5512 search results - page 23 / 1103
» Mobile networks unplugged
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Mobile Chedar - A Peer-to-Peer Middleware for Mobile Devices
This paper presents the Mobile Chedar Peer-to-Peer middleware for mobile peer-to-peer applications. The middleware is an extension to the Chedar peer-to-peer network allowing mobi...
Niko Kotilainen, Matthieu Weber, Mikko Vapa, Juori...
HICSS
2012
IEEE
265views Biometrics» more  HICSS 2012»
12 years 3 months ago
Change and Control Paradoxes in Mobile Infrastructure Innovation: The Android and iOS Mobile Operating Systems Cases
The advent of the smartphone as a highly complex technology has been accompanied by mobile operating systems (OS), large communities of developers, diverse content providers, and ...
David Tilson, Carsten Sørensen, Kalle Lyyti...
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 2 months ago
A guide to trust in mobile ad hoc networks
In this paper we examine issues of trust and reputation in Mobile Ad hoc Networks. We look at a number of the trust and reputation models that have been proposed and we highlight o...
Shane Balfe, Po-Wah Yau, Kenneth G. Paterson
CCR
1999
109views more  CCR 1999»
13 years 7 months ago
Open signaling for ATM, internet and mobile networks (OPENSIG'98)
The ability to rapidly create and deploy new transport, control and management architectures in response to new service demands is a key factor driving the programmable networking...
Andrew T. Campbell, Irene Katzela, Kazuho Miki, Jo...
INFOCOM
2011
IEEE
12 years 11 months ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...