Abstract is missing.
- Life, the universe, and the future of mobile computingRoy Want. 1 [doi]
- Brimon: a sensor network system for railway bridge monitoringKameswari Chebrolu, Bhaskaran Raman, Nilesh Mishra, Phani Kumar Valiveti, Raj Kumar. 2-14 [doi]
- Virtual trip lines for distributed privacy-preserving traffic monitoringBaik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, Daniel B. Work, Juan Carlos Herrera, Alexandre M. Bayen, Murali Annavaram, Quinn Jacobson. 15-28 [doi]
- The pothole patrol: using a mobile sensor network for road surface monitoringJakob Eriksson, Lewis Girod, Bret Hull, Ryan Newton, Samuel Madden, Hari Balakrishnan. 29-39 [doi]
- Improving wireless privacy with an identifier-free link layer protocolBen Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall. 40-53 [doi]
- Supporting vehicular mobility in urban multi-hop wireless networksAnastasios Giannoulis, Marco Fiore, Edward W. Knightly. 54-66 [doi]
- Composcan: adaptive scanning for efficient concurrent communications and positioning with 802.11Thomas King, Mikkel Baun Kjærgaard. 67-80 [doi]
- Flashproxy: transparently enabling rich web content via remote executionAlexander Moshchuk, Steven D. Gribble, Henry M. Levy. 81-93 [doi]
- Enhancing web browsing security on public terminals using mobile compositionRichard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering. 94-105 [doi]
- Design, analysis, and implementation of a large-scale real-time location-based information sharing systemYing Cai, Toby Xu. 106-117 [doi]
- Efficient channel-aware rate adaptation in dynamic environmentsGlenn Judd, Xiaohui Wang, Peter Steenkiste. 118-131 [doi]
- Symphony: synchronous two-phase rate and power control in 802.11 wlansKishore Ramachandran, Ravi Kokku, Honghai Zhang, Marco Gruteser. 132-145 [doi]
- Micro power management of active 802.11 interfacesJiayang Liu, Lin Zhong. 146-159 [doi]
- Peopletones: a system for the detection and notification of buddy proximity on mobile phonesKevin A. Li, Timothy Sohn, Steven Huang, William G. Griswold. 160-173 [doi]
- Micro-Blog: sharing and querying content through mobile phones and social participationShravan Gaonkar, Jack Li, Romit Roy Choudhury, Landon Cox, Al Schmidt. 174-186 [doi]
- Sherlock: automatically locating objects for humansAditya Nemmaluri, Mark D. Corner, Prashant J. Shenoy. 187-198 [doi]
- Trustworthy and personalized computing on public kiosksScott Garriss, Ramón Cáceres, Stefan Berger, Reiner Sailer, Leendert van Doorn, Xiaolan Zhang. 199-210 [doi]
- Anonysense: privacy-aware people-centric sensingCory Cornelius, Apu Kapadia, David Kotz, Daniel Peebles, Minho Shin, Nikos Triandopoulos. 211-224 [doi]
- Behavioral detection of malware on mobile handsetsAbhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park. 225-238 [doi]
- Detecting energy-greedy anomalies and mobile malware variantsHahnsang Kim, Joshua Smith, Kang G. Shin. 239-252 [doi]
- Sixthsense: rfid-based enterprise intelligenceLenin Ravindranath, Venkata N. Padmanabhan, Piyush Agrawal. 253-266 [doi]
- SeeMon: scalable and energy-efficient context monitoring framework for sensor-rich mobile environmentsSeungwoo Kang, Jinwon Lee, Hyukjae Jang, Hyonik Lee, Youngki Lee, Souneil Park, Taiwoo Park, Junehwa Song. 267-280 [doi]
- Cascadia: a system for specifying, detecting, and managing rfid eventsEvan Welbourne, Nodira Khoussainova, Julie Letchner, Yang Li, Magdalena Balazinska, Gaetano Borriello, Dan Suciu. 281-294 [doi]