


default search action
3. MobiQuitous 2006: San Jose, California, USA
- Hamid Ahmadi, Tom La Porta:
3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MOBIQUITOUS 2006, San Jose, California, USA, July 17-21, 2006. IEEE Computer Society 2006, ISBN 1-4244-0498-3 - Yutaka Yanagisawa, Hidetoshi Kido, Tetsuji Satoh:
Location Privacy of Users in Location-based Services. 1-4 - Nikos Anerousis, Ajay Mohindra:
The Software-as-a-Service Model for Mobile and Ubiquitous Computing Environments. 1-6 - Tatiana Bokareva, Nirupama Bulusu, Sanjay K. Jha
:
Learning Sensor Data Characteristics in Unknown Environments. 1-8 - Stephan Sigg
, Sandra Haseloff, Klaus David:
The Impact of the Context Interpretation Error on the Context Prediction Accuracy. 1-4 - Patrick Eugster, Benoît Garbinato, Adrian Holzer:
Pervaho: A Development & Test Platform for Mobile Ad hoc Applications. 1-5 - Mbou Eyole-Monono, Robert K. Harle, Andy Hopper:
POISE: An Inexpensive, Low-Power Location Sensor Based on Electrostatics. 1-3 - Miquel Martin, Petteri Nurmi:
A Generic Large Scale Simulator for Ubiquitous Computing. 1-3 - Frederic Thouin, Richard W. Thommes, Mark J. Coates:
Optimal Actuation Strategies for Sensor/Actuator Networks. 1-8 - Sudha Krishnamurthy, Dipanjan Chakraborthy, Sandeep Jindal, Sumit Mittal:
Context-Based Adaptation of Mobile Phones Ussing Near-Field Communication. 1-10 - Hugo Miranda
, Luís E. T. Rodrigues:
A Framework to Provide Anonymity in Reputation Systems. 1-4 - Simone Leggio, Hugo Miranda
, Kimmo E. E. Raatikainen, Luís E. T. Rodrigues:
SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks. 1-4 - Ling Zhou, Arunabha Sen:
Adaptilve Data Collectilon Scheme for Trackilng Mobille Target in Wireless Sensor Networks. 1-10 - Leonid Bolotnyy, Gabriel Robins:
Generalized "Yoking-Proofs" for a Group of RFID Tags. 1-4 - Mohamed Aly, Panos K. Chrysanthis
, Kirk Pruhs:
Decomposing Data-Centric Storage Query Hot-Spots in Sensor Networks. 1-9 - Daniel Crawl, Joseph Dunn, John K. Bennett, Avneesh Bhatnagar, Evan Speight:
Using Location Dependence to Manage Mobile Data. 1-7 - K. N. Sridhar, Mun Choon Chan:
Interference based Call Admission Control for Wireless Ad Hoc Networks. 1-10 - Humeyra Topcu-Altintas, Yun Huang, Nalini Venkatasubramanian:
Overload-Driven Mobility-Aware Cache Management in Wireless Environments. 1-3 - Sundaram Rajagopalan, Chien-Chung Shen:
A Cross-layer Decentralized BitTorrent for Mobile Ad hoc Networks. 1-10 - Jian Li, Zhi Li, Prasant Mohapatra:
APHD: End-to-End Delay Assurance in 802.11e Based MANETs. 1-8 - Tamer Nadeem
, Pravin Shankar, Liviu Iftode:
A Comparative Study of Data Dissemination Models for VANETs. 1-10 - Jing Su, Ashvin Goel, Eyal de Lara:
An Empirical Evaluation of the Student-Net Delay Tolerant Network. 1-10 - Mirco Musolesi
, Cecilia Mascolo:
Controlled Epidemic-style Dissemination Middleware for Mobile Ad Hoc Networks. 1-9 - John F. Buford, Bernard Burg, Emré Celebi, Phyllis G. Frankl:
Sleeper: A Power-Conserving Service Discovery Protocol. 1-10 - Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou:
MURU: A Multi-Hop Routing Protocol for Urban Vehicular Ad Hoc Networks. 1-8 - Nishkam Ravi, Marco Gruteser, Liviu Iftode:
Non-Inference: An Information Flow Control Model for Location-based Services. 1-10 - Hyun Seo Oh, Jonghoon Ryu, Oscar Y. Takeshita:
Rapid Dual Channel Frequency and Frame Synchronizer for OFDM Packet Transmission. 1-6 - Qian Tao, Raymond N. J. Veldhuis:
Biometric Authentication for a Mobile Personal Device. 1-3 - Jinsong Lin, Thomas Phan, Rajive L. Bagrodia:
TypeCast: Type-Based Routing in Wireless Ad-hoc Networks. 1-10 - Luis Sánchez
, Jorge Lanza
, Rasmus L. Olsen, Martin Bauer, Marc Girod-Genet:
A Generic Context Management Framework for Personal Networking Environments. 1-8 - David J. Lutz, Ruth del Campo:
Bridging the Gap between Privacy and Security in Multi-Domain Federations with Identity Tokens. 1-3 - Stephan Eichler, Christoph Schroth, Timo Kosch, Markus Strassberger:
Strategies for Context-Adaptive Message Dissemination in Vehicular Ad Hoc Networks. 1-9 - John Bush, James Irvine
, John Dunlop:
Removing The Barriers to Ubiquitous Services : A User Perspective. 1-5 - Kasper Løvborg Jensen, Christian Fischer Pedersen
, Lars Bo Larsen
:
Towards Useful and Usable Services in Personal Networks. 1-8 - T. J. M. Coenen, P. T. H. Goering, Assed Jehangir, J. L. van den Berg, Richard J. Boucherie
, Sonia M. Heemstra de Groot, Geert J. Heijenk
, Santpal Singh Dhillon, Weidong Lu, Anthony C. C. Lo, Piet Van Mieghem, Ignas G. Niemegeers:
Architectural and QoS Aspects of Personal Networks. 1-3 - David W. Matolak, Indranil Sen, Wenhui Xiong:
Channel Modeling for V2V Communications. 1-7 - Stephen Herborn, Aruna Seneviratne
:
Service Composition for Mobile Personal Networks. 1-8 - Iacopo Carreras, Daniele Miorandi, Imrich Chlamtac:
A Framework for Opportunistic Forwarding in Disconnected Networks. 1-8 - Assed Jehangir, Sonia M. Heemstra de Groot:
A Security Architecture for Personal Networks. 1-8 - Bart Braem, Benoît Latré, Ingrid Moerman
, Chris Blondia, Piet Demeester:
The Wireless Autonomous Spanning tree Protocol for Multihop Wireless Body Area Networks. 1-8 - Anand Patwardhan, Anupam Joshi
, Tim Finin, Yelena Yesha:
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks. 1-8 - Zhi (Judy) Fu, John C. Strassner:
Access Control and Authentication for Converged Wireless Networks. 1-8 - Anand Dersingh, Ramiro Liscano, Allan G. Jost:
Using semantic policies for ad-hoc coalition access control. 1-8 - YounSun Cho, Lichun Bao, Michael T. Goodrich
:
LAAC: A Location-Aware Access Control Protocol. 1-7 - Natalya Fedotova, Luca Veltri:
Byzantine Generals Problem in the Light of P2P Computing. 1-5 - Rachid Ait Yaiz, Franklin Selgert, Frank T. H. den Hartog:
On the definition and relevance of context-awareness in Personal Networks. 1-6 - Naoki Shibata
, Takashi Terauchi, Tomoya Kitani, Keiichi Yasumoto
, Minoru Ito, Teruo Higashino:
A Method for Sharing Traffic Jam Information using Inter-Vehicle Communication. 1-7 - Petteri Nurmi, Johan Koolwaaij:
Identifying meaningful locations. 1-8 - Jean Lorchat, Keisuke Uehara:
Optimized inter-vehicle communications using NEMO and MANET. 1-6 - Tomoyuki Yashiro:
A new paradigm of V2V communication services using Nomadic Agent. 1-6 - Jasmine Chennikara-Varghese, Wai Chen, Onur Altintas, Shengwei Cai:
Survey of Routing Protocols for Inter-Vehicle Communications. 1-5 - Uichin Lee, Joon-Sang Park
, Eyal Amir, Mario Gerla:
FleaNet: A Virtual Market Place on Vehicular Networks. 1-8 - Weidong Xiang, Paul C. Richardson, Jinhua Guo:
Introduction and Preliminary Experimental Results of Wireless Access for Vehicular Environments (WAVE) Systems. 1-8 - Rama Vuyyuru, Kentaro Oguchi, Clay Collier, Ed Koch:
Automesh: Flexible Simulation Framework for Vehicular Communication. 1-6 - Wai Chen, Jasmine Chennikara-Varghese, John Lee, Shengwei Cai, Toshiro Hikita:
Dynamic Local Peer Group Organizations for Vechicle Communications. 1-8 - Sangho Oh, Jaewon Kang, Marco Gruteser:
Location-Based Flooding Techniques for Vehicular Emergency Messaging. 1-9 - Dimitris M. Kyriazanos
, George I. Stassinopoulos, Neeli R. Prasad:
Ubiquitous Access Control and Policy Management in Personal Networks. 1-6 - Sukwon Choi, Hojung Cha:
Application-Centric Networking Framework for Wireless Sensor Nodes. 1-8 - Sigurd Eskeland, Neeli R. Prasad:
A Novel Decentralized Hierarchical Access Control Scheme for the Medical Scenario. 1-6 - Rahul Mangharam, Daniel S. Weller, Raj Rajkumar, Priyantha Mudalige, Fan Bai:
GrooveNet: A Hybrid Simulator for Vehicle-to-Vehicle Networks. 1-8 - Hongliang Ren
, Max Q.-H. Meng:
Rate Control to Reduce Bioeffects in Wireless Biomedical Sensor Networks. 1-7 - Shiow-Fen Hwang, Yi-Yu Su, Yi-Yo Lin, Chyi-Ren Dow:
A Cluster-Based Coverage-Preserved Node Scheduling Scheme in Wireless Sensor Networks. 1-7 - R. Venkatesha Prasad, Martin Jacobsson, Sonia M. Heemstra de Groot, Anthony C. C. Lo, Ignas G. Niemegeers:
Architectures for Communication in Personal Networks. 1-9 - Kumar Padmanabh
, Rajarshi Roy:
Bottleneck around Base Station in Wireless Sensor Network and its Solution. 1-5 - Anthony C. C. Lo, Weidong Lu, Martin Jacobsson, R. Venkatesha Prasad, Ignas G. Niemegeers:
Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks. 1-8 - Sudha Krishnamurthy:
TinySIP: Providing Seamless Access to Sensor-based Services. 1-9 - Pierre-Guillaume Raverdy, Valérie Issarny, Rafik Chibout, Agnès de La Chapelle:
A Multi-Protocol Approach to Service Discovery and Access in Pervasive Environments. 1-9 - Tanya G. Roosta, Marci Meingast, Shankar Sastry:
Distributed Reputation System for Tracking Applications in Sensor Networks. 1-8 - Sven Lachmund, Thomas Walter, Laurent Gomez, Laurent Bussard, Eddy Olk:
Context-Aware Access Control; Making Access Control Decisions Based on Context Information. 1-8 - Andreea Berfield, Daniel Mossé:
Efficient Scheduling for Sensor Networks. 1-8 - Xin Zhang, Lama Nachman, George F. Riley, Ralph Kling:
Metric-Based Scatternet Formation and Recovery Optimization for Intel Mote. 1-7 - Farooq Anjum:
Challenges on providing services in a Ubiquitous, Mobile Environment. 1-3 - Alessandro Ordine, Julian F. Gutierrez, Luca Veltri:
SIP roaming solution amongst different WLAN-based service providers. 1-7 - Siddhartha K. Goel, Tamer A. ElBatt, Mani B. Srivastava:
Towards Balancing Medium Access Energy Trade-Offs in Wireless Sensor Networks. 1-8 - Carsten Metz:
Dynamic multiband antenna system for high capacity data communications to mobile platforms. 1-5 - Alaa Eddien Abdallah, Thomas Fevens, Jaroslav Opatrny:
Randomized 3D Position-based Routing Algorithms for Ad-hoc Networks. 1-8 - Giovanni Bartolomeo, Stefano Salsano
, Nicola Blefari-Melazzi:
Exploiting Access Control Information in User Profiles to Reconfigure User Equipment. 1-8 - Huang Xuyong, Liu Pei:
A Discrete Distributed Topology-control Algorithm of Wireless Sensor Network. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.