default search action
3. MobiQuitous 2006: San Jose, California, USA
- Hamid Ahmadi, Tom La Porta:
3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MOBIQUITOUS 2006, San Jose, California, USA, July 17-21, 2006. IEEE Computer Society 2006, ISBN 1-4244-0498-3 - Yutaka Yanagisawa, Hidetoshi Kido, Tetsuji Satoh:
Location Privacy of Users in Location-based Services. 1-4 - Nikos Anerousis, Ajay Mohindra:
The Software-as-a-Service Model for Mobile and Ubiquitous Computing Environments. 1-6 - Tatiana Bokareva, Nirupama Bulusu, Sanjay K. Jha:
Learning Sensor Data Characteristics in Unknown Environments. 1-8 - Stephan Sigg, Sandra Haseloff, Klaus David:
The Impact of the Context Interpretation Error on the Context Prediction Accuracy. 1-4 - Patrick Eugster, Benoît Garbinato, Adrian Holzer:
Pervaho: A Development & Test Platform for Mobile Ad hoc Applications. 1-5 - Mbou Eyole-Monono, Robert K. Harle, Andy Hopper:
POISE: An Inexpensive, Low-Power Location Sensor Based on Electrostatics. 1-3 - Miquel Martin, Petteri Nurmi:
A Generic Large Scale Simulator for Ubiquitous Computing. 1-3 - Frederic Thouin, Richard W. Thommes, Mark J. Coates:
Optimal Actuation Strategies for Sensor/Actuator Networks. 1-8 - Sudha Krishnamurthy, Dipanjan Chakraborthy, Sandeep Jindal, Sumit Mittal:
Context-Based Adaptation of Mobile Phones Ussing Near-Field Communication. 1-10 - Hugo Miranda, Luís E. T. Rodrigues:
A Framework to Provide Anonymity in Reputation Systems. 1-4 - Simone Leggio, Hugo Miranda, Kimmo E. E. Raatikainen, Luís E. T. Rodrigues:
SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks. 1-4 - Ling Zhou, Arunabha Sen:
Adaptilve Data Collectilon Scheme for Trackilng Mobille Target in Wireless Sensor Networks. 1-10 - Leonid Bolotnyy, Gabriel Robins:
Generalized "Yoking-Proofs" for a Group of RFID Tags. 1-4 - Mohamed Aly, Panos K. Chrysanthis, Kirk Pruhs:
Decomposing Data-Centric Storage Query Hot-Spots in Sensor Networks. 1-9 - Daniel Crawl, Joseph Dunn, John K. Bennett, Avneesh Bhatnagar, Evan Speight:
Using Location Dependence to Manage Mobile Data. 1-7 - K. N. Sridhar, Mun Choon Chan:
Interference based Call Admission Control for Wireless Ad Hoc Networks. 1-10 - Humeyra Topcu-Altintas, Yun Huang, Nalini Venkatasubramanian:
Overload-Driven Mobility-Aware Cache Management in Wireless Environments. 1-3 - Sundaram Rajagopalan, Chien-Chung Shen:
A Cross-layer Decentralized BitTorrent for Mobile Ad hoc Networks. 1-10 - Jian Li, Zhi Li, Prasant Mohapatra:
APHD: End-to-End Delay Assurance in 802.11e Based MANETs. 1-8 - Tamer Nadeem, Pravin Shankar, Liviu Iftode:
A Comparative Study of Data Dissemination Models for VANETs. 1-10 - Jing Su, Ashvin Goel, Eyal de Lara:
An Empirical Evaluation of the Student-Net Delay Tolerant Network. 1-10 - Mirco Musolesi, Cecilia Mascolo:
Controlled Epidemic-style Dissemination Middleware for Mobile Ad Hoc Networks. 1-9 - John F. Buford, Bernard Burg, Emré Celebi, Phyllis G. Frankl:
Sleeper: A Power-Conserving Service Discovery Protocol. 1-10 - Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou:
MURU: A Multi-Hop Routing Protocol for Urban Vehicular Ad Hoc Networks. 1-8 - Nishkam Ravi, Marco Gruteser, Liviu Iftode:
Non-Inference: An Information Flow Control Model for Location-based Services. 1-10 - Hyun Seo Oh, Jonghoon Ryu, Oscar Y. Takeshita:
Rapid Dual Channel Frequency and Frame Synchronizer for OFDM Packet Transmission. 1-6 - Qian Tao, Raymond N. J. Veldhuis:
Biometric Authentication for a Mobile Personal Device. 1-3 - Jinsong Lin, Thomas Phan, Rajive L. Bagrodia:
TypeCast: Type-Based Routing in Wireless Ad-hoc Networks. 1-10 - Luis Sánchez, Jorge Lanza, Rasmus L. Olsen, Martin Bauer, Marc Girod-Genet:
A Generic Context Management Framework for Personal Networking Environments. 1-8 - David J. Lutz, Ruth del Campo:
Bridging the Gap between Privacy and Security in Multi-Domain Federations with Identity Tokens. 1-3 - Stephan Eichler, Christoph Schroth, Timo Kosch, Markus Strassberger:
Strategies for Context-Adaptive Message Dissemination in Vehicular Ad Hoc Networks. 1-9 - John Bush, James Irvine, John Dunlop:
Removing The Barriers to Ubiquitous Services : A User Perspective. 1-5 - Kasper Løvborg Jensen, Christian Fischer Pedersen, Lars Bo Larsen:
Towards Useful and Usable Services in Personal Networks. 1-8 - T. J. M. Coenen, P. T. H. Goering, Assed Jehangir, J. L. van den Berg, Richard J. Boucherie, Sonia M. Heemstra de Groot, Geert J. Heijenk, Santpal Singh Dhillon, Weidong Lu, Anthony C. C. Lo, Piet Van Mieghem, Ignas G. Niemegeers:
Architectural and QoS Aspects of Personal Networks. 1-3 - David W. Matolak, Indranil Sen, Wenhui Xiong:
Channel Modeling for V2V Communications. 1-7 - Stephen Herborn, Aruna Seneviratne:
Service Composition for Mobile Personal Networks. 1-8 - Iacopo Carreras, Daniele Miorandi, Imrich Chlamtac:
A Framework for Opportunistic Forwarding in Disconnected Networks. 1-8 - Assed Jehangir, Sonia M. Heemstra de Groot:
A Security Architecture for Personal Networks. 1-8 - Bart Braem, Benoît Latré, Ingrid Moerman, Chris Blondia, Piet Demeester:
The Wireless Autonomous Spanning tree Protocol for Multihop Wireless Body Area Networks. 1-8 - Anand Patwardhan, Anupam Joshi, Tim Finin, Yelena Yesha:
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks. 1-8 - Zhi (Judy) Fu, John C. Strassner:
Access Control and Authentication for Converged Wireless Networks. 1-8 - Anand Dersingh, Ramiro Liscano, Allan G. Jost:
Using semantic policies for ad-hoc coalition access control. 1-8 - YounSun Cho, Lichun Bao, Michael T. Goodrich:
LAAC: A Location-Aware Access Control Protocol. 1-7 - Natalya Fedotova, Luca Veltri:
Byzantine Generals Problem in the Light of P2P Computing. 1-5 - Rachid Ait Yaiz, Franklin Selgert, Frank T. H. den Hartog:
On the definition and relevance of context-awareness in Personal Networks. 1-6 - Naoki Shibata, Takashi Terauchi, Tomoya Kitani, Keiichi Yasumoto, Minoru Ito, Teruo Higashino:
A Method for Sharing Traffic Jam Information using Inter-Vehicle Communication. 1-7 - Petteri Nurmi, Johan Koolwaaij:
Identifying meaningful locations. 1-8 - Jean Lorchat, Keisuke Uehara:
Optimized inter-vehicle communications using NEMO and MANET. 1-6 - Tomoyuki Yashiro:
A new paradigm of V2V communication services using Nomadic Agent. 1-6 - Jasmine Chennikara-Varghese, Wai Chen, Onur Altintas, Shengwei Cai:
Survey of Routing Protocols for Inter-Vehicle Communications. 1-5 - Uichin Lee, Joon-Sang Park, Eyal Amir, Mario Gerla:
FleaNet: A Virtual Market Place on Vehicular Networks. 1-8 - Weidong Xiang, Paul C. Richardson, Jinhua Guo:
Introduction and Preliminary Experimental Results of Wireless Access for Vehicular Environments (WAVE) Systems. 1-8 - Rama Vuyyuru, Kentaro Oguchi, Clay Collier, Ed Koch:
Automesh: Flexible Simulation Framework for Vehicular Communication. 1-6 - Wai Chen, Jasmine Chennikara-Varghese, John Lee, Shengwei Cai, Toshiro Hikita:
Dynamic Local Peer Group Organizations for Vechicle Communications. 1-8 - Sangho Oh, Jaewon Kang, Marco Gruteser:
Location-Based Flooding Techniques for Vehicular Emergency Messaging. 1-9 - Dimitris M. Kyriazanos, George I. Stassinopoulos, Neeli R. Prasad:
Ubiquitous Access Control and Policy Management in Personal Networks. 1-6 - Sukwon Choi, Hojung Cha:
Application-Centric Networking Framework for Wireless Sensor Nodes. 1-8 - Sigurd Eskeland, Neeli R. Prasad:
A Novel Decentralized Hierarchical Access Control Scheme for the Medical Scenario. 1-6 - Rahul Mangharam, Daniel S. Weller, Raj Rajkumar, Priyantha Mudalige, Fan Bai:
GrooveNet: A Hybrid Simulator for Vehicle-to-Vehicle Networks. 1-8 - Hongliang Ren, Max Q.-H. Meng:
Rate Control to Reduce Bioeffects in Wireless Biomedical Sensor Networks. 1-7 - Shiow-Fen Hwang, Yi-Yu Su, Yi-Yo Lin, Chyi-Ren Dow:
A Cluster-Based Coverage-Preserved Node Scheduling Scheme in Wireless Sensor Networks. 1-7 - R. Venkatesha Prasad, Martin Jacobsson, Sonia M. Heemstra de Groot, Anthony C. C. Lo, Ignas G. Niemegeers:
Architectures for Communication in Personal Networks. 1-9 - Kumar Padmanabh, Rajarshi Roy:
Bottleneck around Base Station in Wireless Sensor Network and its Solution. 1-5 - Anthony C. C. Lo, Weidong Lu, Martin Jacobsson, R. Venkatesha Prasad, Ignas G. Niemegeers:
Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks. 1-8 - Sudha Krishnamurthy:
TinySIP: Providing Seamless Access to Sensor-based Services. 1-9 - Pierre-Guillaume Raverdy, Valérie Issarny, Rafik Chibout, Agnès de La Chapelle:
A Multi-Protocol Approach to Service Discovery and Access in Pervasive Environments. 1-9 - Tanya G. Roosta, Marci Meingast, Shankar Sastry:
Distributed Reputation System for Tracking Applications in Sensor Networks. 1-8 - Sven Lachmund, Thomas Walter, Laurent Gomez, Laurent Bussard, Eddy Olk:
Context-Aware Access Control; Making Access Control Decisions Based on Context Information. 1-8 - Andreea Berfield, Daniel Mossé:
Efficient Scheduling for Sensor Networks. 1-8 - Xin Zhang, Lama Nachman, George F. Riley, Ralph Kling:
Metric-Based Scatternet Formation and Recovery Optimization for Intel Mote. 1-7 - Farooq Anjum:
Challenges on providing services in a Ubiquitous, Mobile Environment. 1-3 - Alessandro Ordine, Julian F. Gutierrez, Luca Veltri:
SIP roaming solution amongst different WLAN-based service providers. 1-7 - Siddhartha K. Goel, Tamer A. ElBatt, Mani B. Srivastava:
Towards Balancing Medium Access Energy Trade-Offs in Wireless Sensor Networks. 1-8 - Carsten Metz:
Dynamic multiband antenna system for high capacity data communications to mobile platforms. 1-5 - Alaa Eddien Abdallah, Thomas Fevens, Jaroslav Opatrny:
Randomized 3D Position-based Routing Algorithms for Ad-hoc Networks. 1-8 - Giovanni Bartolomeo, Stefano Salsano, Nicola Blefari-Melazzi:
Exploiting Access Control Information in User Profiles to Reconfigure User Equipment. 1-8 - Huang Xuyong, Liu Pei:
A Discrete Distributed Topology-control Algorithm of Wireless Sensor Network. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.