Sciweavers

65 search results - page 5 / 13
» percom 2008
Sort
View
PERCOM
2008
ACM
14 years 9 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar
PERCOM
2008
ACM
14 years 9 months ago
Cardinality Estimation for Large-scale RFID Systems
Counting or estimating the number of tags is crucial for large-scale RFID systems. The use of multiple readers was recently proposed to improve the efficiency and effectiveness in ...
Chen Qian, Hoilun Ngan, Yunhao Liu
PERCOM
2008
ACM
14 years 9 months ago
Efficient Retargeting of Generated Device User-Interfaces
Many pervasive computing systems have been built for using mobile computers to interact with networked devices. To deploy a device's user-interface, several systems dynamical...
Olufisayo Omojokun, Prasun Dewan
PERCOM
2008
ACM
14 years 9 months ago
Non-anchored Unified Naming for Ubiquitous Computing Environments
Users and developers require some way to identify by human readable names the many resources that comprise a ubiquitous computing environment. In addition, naming in such environm...
Yoo Chul Chung, Dongman Lee
PERCOM
2008
ACM
14 years 9 months ago
A Survey of Current Directions in Service Placement in Mobile Ad-hoc Networks
Service placement deals with the problem of selecting which node in a network is most suitable for hosting a service that responds to queries from other nodes. Optimally placing s...
Georg Wittenburg, Jochen H. Schiller