Sciweavers

6781 search results - page 1185 / 1357
» Processors for Mobile Applications
Sort
View
MM
2010
ACM
152views Multimedia» more  MM 2010»
13 years 9 months ago
Content without context is meaningless
We revisit one of the most fundamental problems in multimedia that is receiving enormous attention from researchers without making much progress in solving it: the problem of brid...
Ramesh Jain, Pinaki Sinha
SIGCOMM
2010
ACM
13 years 9 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
ADHOC
2008
88views more  ADHOC 2008»
13 years 9 months ago
Safari: A self-organizing, hierarchical architecture for scalable ad hoc networking
As wireless devices become more pervasive, mobile ad hoc networks are gaining importance, motivating the development of highly scalable ad hoc networking techniques. In this paper...
Shu Du, Ahamed Khan, Santashil PalChaudhuri, Ansle...
ADHOC
2007
139views more  ADHOC 2007»
13 years 9 months ago
Bounded-distance multi-clusterhead formation in wireless ad hoc networks
We present a clustering technique addressing redundancy for bounded-distance clusters, which means being able to determine the minimum number of cluster-heads per node, and the ma...
Marco Aurélio Spohn, J. J. Garcia-Luna-Acev...
CN
2007
146views more  CN 2007»
13 years 9 months ago
Autonomic control and personalization of a wireless access network
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two relat...
Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femm...
« Prev « First page 1185 / 1357 Last » Next »