default search action
MobiQuitous 2007: Philadelphia, PA, USA
- 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, USA. IEEE Computer Society 2007, ISBN 978-1-4244-1024-8
- Trevor Pering, Roy Want, Lamar Gardere, Kristin Vadas, Evan Welbourne:
Musicology: Bringing Personal Music into Shared Spaces. 1-8 - David Graumann, Giuseppe Raffa, Meghan Quirk, Braden Sawyer, Justin Chong, Mark T. Jones, Thomas Martin:
Large Surface Area Electronic Textiles for Ubiquitous Computing: A System Approach. 1-8 - Joel Wilson, Vikas Bhargava, Andrew Redfern, Paul K. Wright:
A Wireless Sensor Network and Incident Command Interface for Urban Firefighting. 1-7 - Jonathan Engelsma, James C. Ferrans:
Bypassing Bluetooth Device Discovery Using a Multimodal User Interface. 1-9 - R. Kipp Jones, Ling Liu, Farshid Alizadeh-Shabdiz:
Improving Wireless Positioning with Look-ahead Map-Matching. 1-8 - Tobias Farrell, Ralph Lange, Kurt Rothermel:
Energy-efficient Tracking of Mobile Objects with Early Distance-based Reporting. 1-8 - Nico Deblauwe, Peter Ruppel:
Combining GPS and GSM Cell-ID positioning for Proactive Location-based Services. 1-7 - Dejan Raskovic, David Giessel:
Battery-Aware Embedded GPS Receiver Node. 1-6 - Juhee Bae, Young Ju Tak, Wonil Lee, Christopher Howson, Jonathan P. Munson:
Poster: Scalable Service-Oriented Telemetry Acquisition and Distribution. 1-3 - Yaser Mowafi, Dongsong Zhang:
A User-centered Approach to Context-awareness in Mobile Computing. 1-3 - Mehdi Sabeur, Ghazi Al Sukkar, Badii Jouaber, Djamal Zeghlache, Hossam Afifi:
A new Routing & Mobility Management Solution for Wireless Mesh Network. 1-3 - Maximilian Michel, Zoran Despotovic, Wolfgang Kellerer, Qing Wei, Jörg Widmer, Norihiro Ishikawa, Takeshi Kato, Tomoyuki Osano:
Poster: P2P search routing concepts for mobile object tracking. 1-3 - Ghazi Al Sukkar, Hossam Afifi, Sidi-Mohammed Senouci:
Lightweight and Distributed Algorithms for Efficient Data-Centric Storage in Sensor Networks. 1-3 - Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang:
Hierarchical Trustworthy Authentication for Pervasive Computing. 1-3 - Jie Teng, Guohong Cao, Tom La Porta:
Demo: Sensor Relocation with Mobile Sensors. 1-3 - Michiharu Takemoto, Yuki Yokohata, Tetsuro Tokunaga, Makoto Hamada, Toshirou Nakamura:
Demo: Implementation of Information-Provision Service with Smart Phone and Field Trial in Shopping Area. 1-3 - Anand Murugappan, Ling Liu:
A SpatioTemporal Placement Model for Caching Location Dependent Queries. 1-8 - Gregory J. Brault, Christopher J. Augeri, Barry E. Mullins, Christopher B. Mayer, Rusty O. Baldwin:
Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes. 1-8 - Shaxun Chen, Tao Gu, XianPing Tao, Jian Lu:
Application Based Distance Measurement for Context Retrieval in Ubiquitous Computing. 1-7 - Liam McNamara, Cecilia Mascolo, Licia Capra:
Content Source Selection in Bluetooth Networks. 1-8 - Artin Avanes, Johann Christoph Freytag, Christof Bornhövd:
Distributed Service Deployment in Mobile Ad-Hoc Networks. 1-8 - Shanshan Jiang, Yuan Xue, Douglas C. Schmidt:
Minimum Disruption Service Composition and Recovery over Mobile Ad Hoc Networks. 1-8 - Rendong Bai, Mukesh Singhal:
Route Discovery in Mobile Ad Hoc Networks: From Unilaterality to Bilaterality. 1-8 - Nadine Shillingford, David Salyers, Christian Poellabauer, Aaron Striegel:
DETOUR: Delay- and Energy-Aware Multi-Path Routing in Wireless Ad Hoc Networks. 1-8 - Pramita Mitra, Christian Poellabauer, Shivajit Mohapatra:
On Improving Dynamic Source Routing for Intermittently Available Nodes in MANETs. 1-5 - René Hansen, Bent Thomsen:
Using Weighted Graphs for Computationally Efficient WLAN Location Determination. 1-5 - Sye Loong Keoh, Naranker Dulay, Emil Lupu, Kevin P. Twidle, Alberto E. Schaeffer Filho, Morris Sloman, Steven Heeps, Stephen D. Strowes, Joseph S. Sventek:
Self-Managed Cell: A Middleware for Managing Body-Sensor Networks. 1-5 - Sewook Jung, Alexander Chang, Mario Gerla:
Temporary Interconnection of ZigBee Personal Area Network (PAN). 1-5 - Asad Amir Pirzada, Marius Portmann:
High Performance AODV Routing Protocol for Hybrid Wireless Mesh Networks. 1-5 - Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty:
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. 1-8 - Rafael Marín López, Ashutosh Dutta, Yoshihiro Ohba, Henning Schulzrinne, Antonio Fernandez Gómez-Skarmeta:
Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks. 1-8 - Daniele Quercia, Stephen Hailes, Licia Capra:
TRULLO - local trust bootstrapping for ubiquitous devices. 1-9 - James Horey, Michael M. Groat, Stephanie Forrest, Fernando Esponda:
Anonymous Data Collection in Sensor Networks. 1-8 - Nancy Miller, Peter Steenkiste:
Design and Evaluation of a Hybrid Physical Space Service for Pervasive Computing Applications. 1-8 - Dirk Trossen, Dana Pavel:
NORS: An Open Source Platform to Facilitate Participatory Sensing with Mobile Phones. 1-8 - Hua Yu, Prasant Mohapatra, Xin Liu:
Dynamic Channel Assignment and Link Scheduling in Multi-Radio Multi-Channel Wireless Mesh Networks. 1-8 - Wei Gao:
Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering. 1-8 - Hannu Verkasalo:
Contextual Usage-Level Analysis of Mobile Services. 1-8 - Thadpong Pongthawornkamol, Klara Nahrstedt, Guijun Wang:
The Analysis of Publish/Subscribe Systems over Mobile Wireless Ad Hoc Networks. 1-8 - Dinesh Rajan, Christian Poellabauer, Andrew Blanford, Bren Mochocki:
Cooperative Dynamic Voltage Scaling using Selective Slack Distribution in Distributed Real-Time Systems. 1-8 - Robert K. Harle:
Spatial Indexing for Location-Aware Systems. 1-8 - Patricia Ordóñez, Palanivel A. Kodeswaran, Vlad Korolev, Wenjia Li, Onkar Walavalkar, Ben Elgamil, Anupam Joshi, Tim Finin, Yelena Yesha, I. George:
A Ubiquitous Context-Aware Environment for Surgical Training. 1-6 - Gautham V. Pallapa, Mohan Kumar, Sajal K. Das:
Privacy Infusion in Ubiquitous Computing. 1-8 - R. Sudha, M. R. Rajagopalan, S. Sridevi, S. Thamarai Selvi:
An Efficient Context-Aware Coordination Model for Ubiquitous Computing. 1-6 - Leszek Lilien:
A Taxonomy of Specialized Ad Hoc Networks and Systems for Emergency Applications. 1-8 - Gabriel Chavira, Salvador W. Nava, Ramón Hervás, José Bravo, Carlos Sánchez:
Towards Touching Interaction: A Simple Explicit Input. 1-5 - Ersan Ozturk, D. Turgay Altilar:
IMOGA: An Architecture for Integrating Mobile Devices into Grid Applications. 1-8 - Nilothpal Talukder, Sheikh Iqbal Ahamed, Rezaul M. Abid:
Smart Tracker: Light Weight Infrastructure-less Assets Tracking solution for Ubiquitous Computing Environment. 1-8 - Chunpeng Yan, H. Howard Fan:
Asynchronous Self-Localization of Sensor Networks with Large Clock Drift. 1-8 - Fei Che, Liang Zhao, Errol L. Lloyd:
Optimal Relay Node Fault Recovery. 1-8 - Harish Sethu, Thomas Gerety:
A Distributed Topology Control Algorithm in the Presence of Multipath Propagation. 1-8 - Renita Machado, Sirin Tekinay:
Diffusion-based Approach to Deploying Wireless Sensors to Satisfy Coverage, Connectivity and Reliability. 1-8 - Guorui Li, Jingsha He, Yingfang Fu:
Secure Multiple Deployment in Wireless Sensor Networks. 1-4 - Xiangrong Xiao, Xingming Sun, Lincong Yang, Minggang Chen:
Secure Data Transmission of Wireless Sensor Network Based on Information Hiding. 1-6 - Yi Zeng, Bo Hu, Hui Feng:
Time Division Flooding Synchronization Protocol for Sensor Networks. 1-8 - Zheng Li, Xiang-Gen Xia:
An Alamouti Coded Cooperative Transmission Robust to Both Timing Errors and Frequency Offsets. 1-5 - Daniele Messina, Marco Ortolani, Giuseppe Lo Re:
Reliable Data Gathering in Tree-Based IEEE 802.15.4 Wireless Sensor Networks. 1-7 - Qianyu Ye, Yu Liu, Lin Zhang, Chan-Hyun Youn:
An Energy Efficiency Scheme Using Local SNR for Clustered Wireless Sensor Networks. 1-4 - Inwhee Joe, Taewon Ahn:
An Efficient Bi-directional Routing Protocol for Wireless Sensor Networks. 1-4 - Albena Mihovska, Neeli R. Prasad:
Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN). 1-5 - Assed Jehangir, Sonia M. Heemstra de Groot:
Securing inter-cluster communication in Personal Networks. 1-6 - Samer Fayssal, Salim Hariri, Youssif B. Al-Nashif, Guangzhi Qu:
Anomaly-Based Behavior Analysis of Wireless Network Security. 1-8 - Frank T. H. den Hartog, M. A. Blom, C. R. Lageweg, M. E. Peeters, J. R. Schmidt, R. van der Veer, Arnout de Vries, M. R. van der Werff, Qian Tao, Raymond N. J. Veldhuis, N. H. G. Baken, Franklin Selgert:
First experiences with Personal Networks as an enabling platform for service providers. 1-8 - Spyros Kopsidas, Dimitris Zisiadis, Leandros Tassiulas:
Design and Implementation of a VIPSec Based Application. 1-6 - Weidong Lu, R. Venkatesha Prasad, Anthony C. C. Lo, Ignas G. Niemegeers:
A Framework for the Self-organization of Personal Networks. 1-8 - Benoît Latré, Bart Braem, Ingrid Moerman, Chris Blondia, Elisabeth Reusens, Wout Joseph, Piet Demeester:
A Low-delay Protocol for Multihop Wireless Body Area Networks. 1-8 - Jinglong Zhou, Martin Jacobsson, Ignas G. Niemegeers:
Cross Layer Design for Enhanced Quality Routing in Personal Wireless Networking. 1-8 - Sandford Bessler, Joachim Zeiss:
Using Semantic Policies to Reason over User Availability. 1-5 - Joud S. Khoury, Henry N. Jerez, Chaouki T. Abdallah:
Efficient User Controlled Inter-Domain SIP Mobility Authentication, Registration, and Call Routing. 1-7 - Sheikh Iqbal Ahamed, Nilothpal Talukder, Munirul M. Haque:
Privacy Challenges in Context-sensitive Access Control for Pervasive Computing Environment. 1-6 - Dave Singelée, Bart Preneel:
Key Establishment Using Secure Distance Bounding Protocols. 1-6 - Mooi Choo Chuah, Peng Yang, Jianbin Han:
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks. 1-8 - Melek Önen, Abdullatif Shikfa, Refik Molva:
Optimistic fair exchange for secure forwarding. 1-5 - Zhu Han, Yan Lindsay Sun:
Securing Cooperative Transmission in Wireless Communications. 1-6 - Wenyuan Xu:
On Adjusting Power to Defend Wireless Networks from Jamming. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.