Sciweavers

267 search results - page 53 / 54
» Wireless Handheld Devices Become Trusted Network Devices
Sort
View
MOBICOM
2012
ACM
11 years 9 months ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 1 months ago
A Frequency Diversity Technique for Interference Mitigation in Coexisting Bluetooth and WLAN
— Co-channel interference has become an important problem with the increasing deployment of wireless networks in the unlicensed frequency band. Most existing schemes aim to avoid...
Jingli Li, Xiangqian Liu
IEEECIT
2010
IEEE
13 years 5 months ago
Smartphone Software Development Course Design Based on Android
—Mobile computing is popular when wireless network has been deployed almost everywhere. Smartphones have been the important tools in our society for the abundant functions includ...
Wei Hu, Tianzhou Chen, Qingsong Shi, Xueqing Lou
CGA
2008
13 years 7 months ago
Mobile 3D City Maps
ion and abstraction. By the end of the 20th century, technology had advanced to the point where computerized methods had revolutionized surveying and mapmaking practices. Now, the ...
Antti Nurminen
CN
2008
108views more  CN 2008»
13 years 5 months ago
An approach to the identification of network elements composing heterogeneous end-to-end paths
Today's networks are becoming increasingly complex and the ability to effectively and efficiently operate and manage them is ever more challenging. Ways to provide end-to-end...
Alessio Botta, Antonio Pescapè, Giorgio Ven...