Sciweavers

13007 search results - page 2270 / 2602
» Wireless and Mobile Networking
Sort
View
PERCOM
2003
ACM
16 years 3 months ago
Pervasive Messaging
Pervasive messaging is the part of pervasive computing that enables users to communicate with each other. Many of today's electronic messaging systems have their own distinct...
Jan-Mark S. Wams, Maarten van Steen
MOBISYS
2005
ACM
16 years 3 months ago
Cracking the Bluetooth PIN
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used du...
Yaniv Shaked, Avishai Wool
MOBISYS
2003
ACM
16 years 3 months ago
Full TCP/IP for 8-Bit Architectures
We describe two small and portable TCP/IP implementations fulfilling the subset of RFC1122 requirements needed for full host-to-host interoperability. Our TCP/IP implementations d...
Adam Dunkels
MOBISYS
2003
ACM
16 years 3 months ago
Predictive Resource Management for Wearable Computing
Achieving crisp interactive response in resource-intensive applications such as augmented reality, language translation, and speech recognition is a major challenge on resource-po...
Dushyanth Narayanan, Mahadev Satyanarayanan
DCC
2003
IEEE
16 years 3 months ago
Unequal Loss Protection for H.263 Compressed Video
We study the application of Unequal Loss Protection (ULP) algorithms to motion-compensated video over lossy packet networks. In particular, we focus on streaming video applications...
Justin Goshi, Richard E. Ladner, Eve A. Riskin, Al...
« Prev « First page 2270 / 2602 Last » Next »