Sciweavers

1107 search results - page 69 / 222
» Pervasive Adaptation for Mobile Computing
Sort
View
140
Voted
PERVASIVE
2005
Springer
15 years 9 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik
146
Voted
ICPR
2008
IEEE
15 years 10 months ago
Hybrid Layered Video Encoding for Mobile Internet-Based Computer Vision and Multimedia Applications
Mobile networked environments are typically resource constrained in terms of the available bandwidth and battery capacity on mobile devices. Realtime video applications entail the ...
Suchendra M. Bhandarkar, Siddhartha Chattopadhyay,...
125
Voted
PERCOM
2010
ACM
15 years 7 months ago
Decomposing power measurements for mobile devices
—Modern mobile phones are an appealing platform for pervasive computing applications. However, the complexity of these devices makes it difficult for developers to understand th...
Andrew Colin Rice, Simon Hay
150
Voted
ICIW
2007
IEEE
15 years 10 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
131
Voted
TMC
2010
124views more  TMC 2010»
15 years 2 months ago
A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks
—The key feature of many emerging pervasive computing applications is to proactively provide services to mobile individuals. One major challenge in providing users with proactive...
Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Youngki L...