Sciweavers

391 search results - page 41 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
WMCSA
2003
IEEE
14 years 1 months ago
Selecting Devices for Aggregation
As intelligent devices become affordable and wireless infrastructure becomes pervasive, the potential to combine, or aggregate, device functionality to provide a user with a bette...
Rajnish Kumar, Vahe Poladian, Ira Greenberg, Alan ...
IPPS
2006
IEEE
14 years 2 months ago
Privacy-aware presence management in instant messaging systems
Information about online presence allows participants of instant messaging (IM) systems to determine whether their prospective communication partners will be able to answer their ...
Karsten Loesing, Markus Dorsch, Martin Grote, Knut...
PERVASIVE
2008
Springer
13 years 8 months ago
Microsearch: When Search Engines Meet Small Devices
Abstract. In this paper, we present Microsearch, a search system suitable for small devices used in ubiquitous computing environments. Akin to a desktop search engine, Microsearch ...
Chiu Chiang Tan, Bo Sheng, Haodong Wang, Qun Li
PERCOM
2003
ACM
14 years 8 months ago
Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services
In pervasive computing environments, powerful handheld devices with wireless connections create opportunities for many new nomadic applications. We propose a new service discovery...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
PKDD
2005
Springer
164views Data Mining» more  PKDD 2005»
14 years 2 months ago
Clustering and Prediction of Mobile User Routes from Cellular Data
Location-awareness and prediction of future locations is an important problem in pervasive and mobile computing. In cellular systems (e.g., GSM) the serving cell is easily availabl...
Kari Laasonen