Sciweavers

1240 search results - page 192 / 248
» Supporting Groupware in Mobile Networks
Sort
View
131
Voted
DIM
2005
ACM
15 years 5 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
146
Voted
DIMVA
2004
15 years 5 months ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
EJWCN
2011
133views more  EJWCN 2011»
14 years 10 months ago
CARNIVORE: A Disruption-Tolerant System for Studying Wildlife
—This paper presents CARNIVORE, a system for in-situ, yet unobtrusive monitoring of cryptic, difficult-tocatch/observe wildlife in their natural habitat. CARNIVORE consists of a...
Matthew Rutishauser, Vladislav Petkov, Jay Boice, ...
132
Voted
PERCOM
2008
ACM
16 years 3 months ago
Information Agents for Pervasive Sensor Networks
In this paper, we describe an information agent, that resides on a mobile computer or personal digital assistant (PDA), that can autonomously acquire sensor readings from pervasiv...
Alex Rogers, Mike Osborne, Sarvapali D. Ramchurn, ...
146
Voted
WOWMOM
2009
ACM
164views Multimedia» more  WOWMOM 2009»
15 years 10 months ago
Selecting vertical handover candidates in IEEE 802.11 mesh networks
The IEEE 802.11 working group currently integrates the option of mesh networking into its standard for WLANs. In addition to WLAN meshes, future wireless networks will be expanded...
Sven Wiethölter, Adam Wolisz