Sciweavers

313 search results - page 9 / 63
» Privacy in Location-Aware Computing Environments
Sort
View
COLCOM
2009
IEEE
14 years 18 days ago
Unified analytical models for Location Management costs and optimum design of location areas
—Within collaborative computing, computer mediated communications are evolving rapidly thanks to the development of new technologies. The facilitation of awareness and discovery ...
Eladio Martin, Ling Liu, Matt Weber, Péter ...
MSWIM
2006
ACM
14 years 1 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
PEWASUN
2004
ACM
14 years 1 months ago
A routing protocol for power constrained networks with asymmetric links
In many instances, an ad hoc network consists of nodes with different hardware and software capabilities as well as power limitations. This is the case of ad hoc grids where devi...
Guoqiang Wang, Yongchang Ji, Dan C. Marinescu, Dam...
PERCOM
2009
ACM
14 years 8 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
GPC
2009
Springer
13 years 11 months ago
Balanced Scheduling Algorithm Considering Availability in Mobile Grid
The emerging Grid is extending the scope of resources to mobile devices and sensors that are connected through unreliable networks. Nowadays the number of mobile device users is in...
JongHyuk Lee, SungJin Song, JoonMin Gil, KwangSik ...