Sciweavers

PERCOM
2004
ACM
14 years 7 months ago
Peer-to-peer File-sharing over Mobile Ad hoc Networks
Current peer-to-peer file-sharing systems mostly work on wired networks. Mobile ad hoc network is characterized as multi-hop wireless communications between mobile devices. In thi...
Gang Ding, Bharat K. Bhargava
PERCOM
2004
ACM
14 years 7 months ago
Mix Zones: User Privacy in Location-aware Services
Privacy of personal location information is becoming an increasingly important issue. This paper refines a method, called the mix zone, developed to enhance user privacy in locati...
Alastair R. Beresford, Frank Stajano
PERCOM
2004
ACM
14 years 7 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva
PERCOM
2004
ACM
14 years 7 months ago
Escape from the Computer Lab: Education in Mobile Wireless Networks
As mobile wireless network technology becomes widespread, the importance of education about this new form of communication is becoming critical. One of the benefits of mobile comp...
Elizabeth M. Belding-Royer
PERCOM
2004
ACM
14 years 7 months ago
Towards Scalable P2P Computing for Mobile Ad Hoc Networks
In mobile ad hoc networks, nodes interact peer-to-peer. They self-organize, share workloads and provide services that they also use. There are middleware platforms, designed for t...
Marco Conti, Enrico Gregori, Giovanni Turi
PERCOM
2004
ACM
14 years 7 months ago
On Negotiating Automatic Device Configuration in Smart Environments
As the number of mobile devices we carry grows, the job of managing those devices throughout the day becomes cumbersome. In addition, the ability to use mobile devices in unethica...
Kay Connelly, Ashraf Khalil
PERCOM
2004
ACM
14 years 7 months ago
Comprehensive Structured Context Profiles (CSCP): Design and Experiences
In dynamic heterogeneous environments, such as Pervasive Computing, context-aware adaptation is a key concept to meet the varying requirements of different clients. To enable such...
Sven Buchholz, Thomas Hamann, Gerald Hübsch
PERCOM
2004
ACM
14 years 7 months ago
Virtual Paths Routing: A Highly Dynamic Routing Protocol for Ad Hoc Wireless Networks
In this paper, we introduce the Virtual Paths Routing (VPR) Protocol for ad hoc wireless networks. VPR provides highly dynamic, correct, and efficient paths creation and maintenan...
Abdulrahman H. Altalhi, Golden G. Richard III
PERCOM
2004
ACM
14 years 7 months ago
Super Spaces: A Middleware for Large-Scale Pervasive Computing Environments
In previous work [1], we introduced a distributed middleware infrastructure for managing physicallybounded, standalone pervasive computing environments, which we refer to as Activ...
Jalal Al-Muhtadi, Shiva Chetan, Anand Ranganathan,...
PERCOM
2004
ACM
14 years 7 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni