Sciweavers

533 search results - page 60 / 107
» Predicting location using mobile phone calls
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 7 months ago
Seamless Flow Migration on Smartphones without Network Support
This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol...
Ahmad Rahmati, Clayton Shepard, Chad Tossell, Ange...
ISCC
2002
IEEE
139views Communications» more  ISCC 2002»
14 years 2 months ago
BWIG: Bluetooth Web Internet Gateway
Bluetooth is a new wireless standard for low cost, low power, local radio communications. This technology is designed to be small enough to fit inside any electronic device, hence...
Nicolas Rouhana, Eric Horlait
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
14 years 4 months ago
Privacy Protected Query Processing on Spatial Networks
With the proliferation of mobile devices (e.g., PDAs, cell phones, etc.), location-based services have become more and more popular in recent years. However, users have to reveal ...
Wei-Shinn Ku, Roger Zimmermann, Wen-Chih Peng, Sus...
HCI
2007
13 years 11 months ago
Learning Topologies of Situated Public Displays by Observing Implicit User Interactions
In this paper we present a procedure to learn a topological model of Situated Public Displays from data of people traveling between these displays. This model encompasses the dista...
Hans Jörg Müller, Antonio Krüger