Sciweavers

MOBISYS
2004
ACM
14 years 8 months ago
DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots
Maxim Raya, Jean-Pierre Hubaux, Imad Aad
MOBISYS
2004
ACM
14 years 8 months ago
uSleep: A Technique for Reducing Energy Consumption in Handheld Devices
Lawrence S. Brakmo, Deborah A. Wallach, Marc A. Vi...
MOBISYS
2004
ACM
14 years 8 months ago
Impact of Radio Irregularity on Wireless Sensor Networks
In this paper, we investigate the impact of radio irregularity on the communication performance in wireless sensor networks. Radio irregularity is a common phenomenon which arises...
Gang Zhou, Tian He, Sudha Krishnamurthy, John A. S...
MOBISYS
2004
ACM
14 years 8 months ago
Exponential Index: A Parameterized Distributed Indexing Scheme for Data on Air
Wireless data broadcast has received a lot of attention from industries and academia in recent years. Access efficiency and energy conservation are two critical performance concer...
Jianliang Xu, Wang-Chien Lee, Xueyan Tang
MOBISYS
2004
ACM
14 years 8 months ago
Hood: A Neighborhood Abstraction for Sensor Networks
Kamin Whitehouse, Cory Sharp, David E. Culler, Eri...
MOBISYS
2004
ACM
14 years 8 months ago
Middleware Support for Reconciling Client Updates and Data Transcoding
Thomas Phan, George Zorpas, Rajive Bagrodia
MOBISYS
2004
ACM
14 years 8 months ago
Bluetooth and WAP Push Based Location-Aware Mobile Advertising System
Advertising on mobile devices has large potential due to the very personal and intimate nature of the devices and high targeting possibilities. We introduce a novel B-MAD system f...
Lauri Aalto, Nicklas Göthlin, Jani Korhonen, ...
MOBISYS
2005
ACM
14 years 8 months ago
Turducken: hierarchical power management for mobile devices
Abstract-Maintaining optimal consistency in a distributed system requires that nodes be always-on to synchronize information. Unfortunately, mobile devices such as laptops do not h...
Jacob Sorber, Nilanjan Banerjee, Mark D. Corner, S...
MOBISYS
2005
ACM
14 years 8 months ago
Cracking the Bluetooth PIN
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used du...
Yaniv Shaked, Avishai Wool
MOBISYS
2005
ACM
14 years 8 months ago
LiveMail: personalized avatars for mobile entertainment
LiveMail is a prototype system that allows mobile subscribers to communicate using personalized 3D face models created from images taken by their phone cameras. The user takes a s...
Miran Mosmondor, Tomislav Kosutic, Igor S. Pandzic