Sciweavers

94 search results - page 18 / 19
» Intentional networking: opportunistic exploitation of mobile...
Sort
View
CAISE
2003
Springer
13 years 10 months ago
Goal-Oriented Requirements Engineering: A Case Study in E-government
This paper presents a requirements engineering framework based on the notions of Actor, Goal, and Intentional Dependency, and applies it to a case study in the field of Informatio...
Paolo Donzelli, Paolo Bresciani
WOWMOM
2005
ACM
126views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
An Integrated Neighbor Discovery and MAC Protocol for Ad Hoc Networks Using Directional Antennas
— Many MAC sub-layer protocols for supporting the usage of directional antennas in ad hoc networks have been proposed in literature. However, there remain two open issues that ar...
Gentian Jakllari, Wenjie Luo, Srikanth V. Krishnam...
MOBILIGHT
2010
13 years 3 months ago
Measuring the Closed-Loop Throughput of 2x2 HSDPA over TX Power and TX Antenna Spacing
Abstract. Mobile network operators demand small base station antennas and high physical layer throughputs. In the downlink, high physical layer throughputs can be achieved by explo...
Sebastian Caban, José Antonio García...
TSP
2012
12 years 24 days ago
Sensing and Probing Cardinalities for Active Cognitive Radios
—In a cognitive radio network, opportunistic spectrum access (OSA) to the underutilized spectrum involves not only sensing the spectrum occupancy but also probing the channel qua...
Thang Van Nguyen, Hyundong Shin, Tony Q. S. Quek, ...
SIGMETRICS
2003
ACM
106views Hardware» more  SIGMETRICS 2003»
13 years 10 months ago
On the effectiveness of movement prediction to reduce energy consumption in wireless communication
—Node movement can be exploited to reduce the energy consumption of wireless network communication. The strategy consists in delaying communication until a mobile node moves clos...
Srijan Chakraborty, David K. Y. Yau, John C. S. Lu...