Sciweavers

1045 search results - page 106 / 209
» Remote Evaluation of Mobile Applications
Sort
View
MOBICOM
2010
ACM
13 years 10 months ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
MOBISYS
2009
ACM
14 years 11 months ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...
MSWIM
2009
ACM
14 years 5 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...
SASN
2003
ACM
14 years 3 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
IWC
1998
130views more  IWC 1998»
13 years 10 months ago
MobiCom: networking dispersed groups
: The paper describes MobiCom, a research project aimed at realising information technology support for dispersed groups of networking, mobile knowledge workers. MobiCom addresses ...
Steinar Kristoffersen, Fredrik Ljungberg