Sciweavers

889 search results - page 170 / 178
» Towards service and user discovery on wireless networks
Sort
View
ICUIMC
2011
ACM
12 years 11 months ago
Opportunities of MIM capture in IEEE 802.11 WLANs: analytic study
Physical layer capture in WLANs makes a receiver to decode a relatively strong packet in a collision. According to recent works, an augmented physical layer capture handles interf...
Joonsoo Lee, Young-myoung Kang, Suchul Lee, Chong-...
MOBIDE
1999
ACM
13 years 12 months ago
Pervasive Computing: What is it Good for?
The first mass-produced pervasive computing devices are starting to appear—the AutoPC, the Internet-connected ScreenFridge, and the combination Microwave Oven/Home Banking term...
Andrew C. Huang, Benjamin C. Ling, Shankar Ponneka...
IADIS
2003
13 years 9 months ago
Personalization of Information Delivery by the Use of Agents
Mass, multi-channel, network access to information requires a solution of several problems related to proper information delivery, including an important problem of adjusting data...
Jarogniew Rykowskia, Arkadiusz Juszkiewicz
TON
2010
132views more  TON 2010»
13 years 5 months ago
The optimality of two prices: maximizing revenue in a stochastic communication system
—This paper considers the problem of pricing and transmission scheduling for an Access Point (AP) in a wireless network, where the AP provides service to a set of mobile users. T...
Longbo Huang, Michael J. Neely
CCS
2001
ACM
14 years 1 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé