Sciweavers

1744 search results - page 293 / 349
» The Steganographic File System
Sort
View
121
Voted
PERCOM
2007
ACM
16 years 3 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
116
Voted
PERCOM
2005
ACM
16 years 3 months ago
Towards seamless mobility on pervasive hardware
Preserving one's uniquely customized computing environment as one moves to different locations is an enduring challenge in mobile computing. We examine why this capability is...
Mahadev Satyanarayanan, Michael Kozuch, Casey Helf...
PERCOM
2005
ACM
16 years 3 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
139
Voted
PERCOM
2003
ACM
16 years 3 months ago
Location-Based E-Campus Web Services: From Design to Deployment
In our previous work, we have designed, using a network-based approach, and are currently deploying on Purdue wireless Infrastructure, a Web service for location discovery of 802....
Simon G. M. Koo, Catherine Rosenberg, Hoi-Ho Chan,...
123
Voted
DCC
2002
IEEE
16 years 3 months ago
PPMexe: PPM for Compressing Software
With the emergence of software delivery platforms such as Microsoft's .NET, code compression has become one of the core enabling technologies strongly affecting system perfor...
Milenko Drinic, Darko Kirovski