Sciweavers

UIST
2005
ACM
14 years 5 months ago
eyeLook: using attention to facilitate mobile media consumption
One of the problems with mobile media devices is that they may distract users during critical everyday tasks, such as navigating the streets of a busy city. We addressed this issu...
Connor Dickie, Roel Vertegaal, Changuk Sohn, Danie...
SI3D
2005
ACM
14 years 5 months ago
A camera-based interface for interaction with mobile handheld computers
Recent advances in mobile computing allow the users to deal with 3D interactive graphics on handheld computers. Although the computing resources and screen resolutions grow steadi...
Martin Hachet, Joachim Pouderoux, Pascal Guitton
IPPS
2005
IEEE
14 years 5 months ago
Energy-Aware Task Scheduling: Towards Enabling Mobile Computing over MANETs
Enabling high performance, persistent mobile computing has recently become a very active research area. The widespread popularity of mobile computing devices, such as laptops, han...
Waleed Alsalih, Selim G. Akl, Hossam S. Hassanein
INFOSCALE
2006
ACM
14 years 5 months ago
A dynamic mechanism for handling mobile computing environmental changes
--Nowadays, the issue of the energy saving on the mobile client is becoming more and more concerned. Among those power conservation techniques, computation offloading schemes are b...
MingJian Tang, Jinli Cao
ICMB
2006
IEEE
138views Business» more  ICMB 2006»
14 years 5 months ago
me-Commerce: An Infrastructure for Personal Predictive Mobile Commerce
Given mobile phone penetration statistics and current mobile phone technical specifications, it is apparent that in developed countries, the majority of citizens carry not just mo...
Andreas Komninos, Peter Barrie, Julian Newman, Stu...
WIMOB
2007
IEEE
14 years 5 months ago
Securing Virtual Private Networks with SIM Authentication
—  With the ever increasing amount of systems requiring user authentication, users are experiencing an substantial inconvenience. A huge amount of passwords needs to be remember...
Torstein Bjørnstad, Ivar Jørstad, Do...
WIMOB
2007
IEEE
14 years 5 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
WIMOB
2007
IEEE
14 years 5 months ago
Performance Analysis of Ranging Process in IEEE 802.16e OFDMA Systems
In this paper, ranging process in IEEE 802.16e OFDMA systems is analyzed and performance is evaluated. Ranging process provides initial network entry, uplink synchronization, and ...
Doo Hwan Lee, Hiroyuki Morikawa
WIMOB
2007
IEEE
14 years 5 months ago
An Efficient and Truthful Leader IDS Election Mechanism for MANET
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
WIMOB
2007
IEEE
14 years 5 months ago
Software Solutions for Converting a MIMO-OFDM Channel into Multiple SISO-OFDM Channels
We present a software approach for MIMO-OFDM wireless communication technology. We first show that complex matrix operations like Singular-Value Decomposition (SVD), diagonalizat...
Mihai Sima, Murugappan Senthilvelan, Daniel Iancu,...