Sciweavers

771 search results - page 140 / 155
» Wireless Network Information Flow: A Deterministic Approach
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
PERCOM
2004
ACM
14 years 7 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
NETGAMES
2006
ACM
14 years 1 months ago
Meeting technology challenges of pervasive augmented reality games
Pervasive games provide a new type of game combining new technologies with the real environment of the players. While this already poses new challenges to the game developer, requ...
Wolfgang Broll, Jan Ohlenburg, Irma Lindt, Iris He...
LISA
2004
13 years 9 months ago
Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments
Periodic data backup is a system administration requirement that has changed as wireless machines have altered the fundamental structure of networks. These changes necessitate a c...
Gregory Pluta, Larry Brumbaugh, William Yurcik, Jo...
GLOBECOM
2008
IEEE
14 years 2 months ago
Numerical Performance Evaluation of OFDM Systems Affected by Transmitter Nonlinearities, Phase Noise and Channel Estimation Erro
Abstract—In this contribution we present a numerical approach to evaluate the bit error rate and mutual information of OFDM links affected by transmitter nonlinearities, phase no...
Steffen Bittner, Marco Krondorf, Gerhard Fettweis