Sciweavers

745 search results - page 119 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
MOBISYS
2008
ACM
14 years 8 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...
JSS
2008
96views more  JSS 2008»
13 years 8 months ago
DR-TCP: Downloadable and reconfigurable TCP
Advances in communication technology allow a variety of new network environments and services available very rapidly. Appearance of various network environments tends to enable a ...
Jae-Hyun Hwang, Jin-Hee Choi, Se-Won Kim, Chuck Yo...
TMC
2012
11 years 11 months ago
E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks
WiFi interface is known to be a primary energy consumer in mobile devices, and idle listening (IL) is the dominant source of energy consumption in WiFi. Most existing protocols, s...
Xinyu Zhang, Kang G. Shin
MOBISYS
2009
ACM
14 years 9 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
SAC
2006
ACM
14 years 2 months ago
A chat interface for human-agent interaction in MAST
In this paper we introduce a group-messaging interface that allows humans to efficiently interact with a group of agents through a hierarchical and customizable text protocol. Our...
Marco M. Carvalho, Matteo Rebeschini, James Horsle...