Context-aware applications adapt their behavior based on changes of the physical world, which is often obtained with a huge amount of sensors. Thus, the development of such …
RJ Hall - US Patent 9,118,428, 2015 - Google Patents
Geographic advertising utilizes a location of a mobile com munications device to infer potential interest in a product and/or service. A scalable network protocol is utilized to …
R Jana, V Aggarwal, J Auzins, R Hall… - US Patent 9,495,870, 2016 - Google Patents
Vehicle-to-vehicle and vehicle-to-infrastructure communi cations are accomplished via a scalable ad hoc geographic routing protocol. As vehicles move along roadways, they can …
RJ Hall - US Patent 8,777,752, 2014 - Google Patents
(57) ABSTRACT A geogame utilizes wireless devices to track the movements of the players. As players move, virtual tails are generated behind each player, and their locations are …
A Gutscher - Proceedings 20th IEEE International Parallel & …, 2006 - ieeexplore.ieee.org
Protecting location information of mobile users in location based services (LBS) is a very important but quite difficult and still largely unsolved problem. Location information has to be …
According to market research, the number of smart cities is increasing rapidly. Information and communication technologies (ICT) provide the smart infrastructure that is the foundation …
RJ Hall - US Patent 9,788,329, 2017 - Google Patents
US9788329B2 - Non-interference technique for spatially aware mobile ad hoc networking - Google Patents US9788329B2 - Non-interference technique for spatially aware mobile ad hoc …
C Becker, D Nicklas - … of the First International Workshop on …, 2004 - pace.itee.uq.edu.au
Context-aware applications adapt their behavior depending on the state of the physical world along with other information representing context. This requires context management …
R Hall - US Patent 8,712,056, 2014 - Google Patents
Security in a mobile ad hoc network is maintained by using various forms of encryption, various encryption schemes, and various multi-phase keying techniques. In one …