Sciweavers

291 search results - page 58 / 59
» A Distributed Wakening Based Target Tracking Protocol for Wi...
Sort
View
CCS
2009
ACM
14 years 9 days ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
ADHOC
2007
122views more  ADHOC 2007»
13 years 5 months ago
Modeling and analyzing the correctness of geographic face routing under realistic conditions
Geographic protocols are very promising for wireless ad hoc and sensor networks due to the low state storage and low message overhead. Under certain idealized conditions, geograph...
Karim Seada, Ahmed Helmy, Ramesh Govindan
SC
2009
ACM
14 years 9 days ago
Kestrel: an XMPP-based framework for many task computing applications
This paper presents a new distributed computing framework for Many Task Computing (MTC) applications, based on the Extensible Messaging and Presence Protocol (XMPP). A lightweight...
Lance Stout, Michael A. Murphy, Sebastien Goasguen
ICRA
2003
IEEE
102views Robotics» more  ICRA 2003»
13 years 10 months ago
Two-dimensional signal transmission technology for robotics
The forms of communication available now are categorized into the one or three dimensional. One dimensional communication includes metal wires and optical fibers in which the elec...
Hiroyuki Shinoda, Naoya Asamura, Mitsuhiro Hakozak...
INFOCOM
2009
IEEE
14 years 4 days ago
Rateless Coding with Feedback
The erasure resilience of rateless codes, such as Luby-Transform (LT) codes, makes them particularly suitable to a wide variety of loss-prone wireless and sensor network applicati...
Andrew Hagedorn, Sachin Agarwal, David Starobinski...