Sciweavers

357 search results - page 51 / 72
» Modeling Spatial and Temporal Dependencies of User Mobility ...
Sort
View
TMC
2008
159views more  TMC 2008»
13 years 6 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
CHI
2005
ACM
14 years 8 months ago
Harnessing mobile ubiquitous video
We are rapidly moving toward a world where personal networked video cameras are ubiquitous. Already, camera-equipped cell phones are becoming commonplace. Imagine being able to ta...
Neil J. McCurdy, Jennifer N. Carlisle, William G. ...
ICNS
2008
IEEE
14 years 2 months ago
Performance Study of PANA Pre-authentication for Interdomain Handover
—To provide seamless mobility to the wireless user, a continuous connection to the Internet is required while moving from one administration domain to another. To enable continuo...
Patryk Chamuczynski, Omar Alfandi, Constantin Wern...
IFIP
2004
Springer
14 years 1 months ago
High Throughput Route Selection in Multi-rate Ad Hoc Wireless Networks
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens
INFOCOM
2011
IEEE
12 years 11 months ago
Opportunistic spectrum access for mobile cognitive radios
—Cognitive radios (CRs) can mitigate the impending spectrum scarcity problem by utilizing their capability of accessing licensed spectrum bands opportunistically. While most exis...
Alexander W. Min, Kyu-Han Kim, Jatinder Pal Singh,...