myacademicproject logo

Mobile Computing

  • myacademicproject categorys

    A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption

    • B.TECH / M.TECH / M.SC / PH.D

    •  Mukesh.B

    • 10 Months ago

    Mobile collaborative community (MCC) is an emerging technology that allows multiple mobile nodes (MNs) to perform a resource intensive task, such as large content download, in a cooperative manner. I

    Know More
  • myacademicproject categorys

    Detecting Mobile Malicious Webpages in Real Time

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 13 Months ago

    Mobile specific webpages differ significantly from their desktop counterparts in content, layout and functionality. Accordingly, existing techniques to detect malicious websites are unlikely to work for such webpages.

    Know More
  • myacademicproject categorys

    Quantifying Interdependent Privacy Risks with Location Data

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 13 Months ago

    Co-location information about users is increasingly available online. For instance, mobile users more and more frequently report their co-locations with other users in the messages and in the pictures they post on social networking websites by tagging the names of the friends they are with.

    Know More
  • myacademicproject categorys

    Searching Trajectories by Regions of Interest

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 13 Months ago

    With the increasing availability of moving-object tracking data, trajectory search is increasingly important. We propose and investigate a novel query type named trajectory search by regions of interest (TSR query). Given an argument set of trajectories

    Know More
  • myacademicproject categorys

    SUPERMAN Security Using Pre-Existing Routing for Mobile Ad hoc Networks

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 12 Months ago

    The flexibility and mobility of Mobile Ad hoc Networks (MANETs) have made them increasing popular in a wide range of use cases. To protect these networks, security protocols have been developed to protect routing and application data.

    Know More