Sciweavers

1030 search results - page 116 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
WORDS
2005
IEEE
15 years 9 months ago
Delay Analysis for Statistical Real-Time Channels in Mobile Ad-Hoc Networks
Wireless devices that communicate using the IEEE 802.11 protocol can be used to create mobile ad-hoc networks (MANETs). Many interesting applications using MANETs are realizable i...
Min-Gu Lee, Sunggu Lee
FC
2008
Springer
82views Cryptology» more  FC 2008»
15 years 5 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
ACMDIS
2008
ACM
15 years 6 months ago
TapGlance: designing a unified smartphone interface
The difference between using one mobile phone and another can feel like learning a new language based on our extensive experience designing mobile applications for spatial data na...
Daniel C. Robbins, Bongshin Lee, Roland Fernandez
129
Voted
PERVASIVE
2009
Springer
15 years 10 months ago
Enabling Pervasive Collaboration with Platform Composition
Abstract. Emerging pervasive computing technologies present many opportunities to aid ad-hoc collocated group collaboration. To better understand ad-hoc collaboration using pervasi...
Trevor Pering, Roy Want, Barbara Rosario, Shivani ...
PROCEDIA
2010
153views more  PROCEDIA 2010»
15 years 2 months ago
Conceptual framework for dynamic trust monitoring and prediction
The dynamic and collaborative nature of mobile and sensor networks raises the issue of how connected mobile devices can be trusted. Despite the existing security paradigms such as...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...