Sciweavers

Share
MSWIM
2015
ACM
2 years 11 months ago
Connectivity Stability in Autonomous Multi-level UAV Swarms for Wide Area Monitoring
Many different types of unmanned aerial vehicles (UAVs) have been developed to address a variety of applications ranging from searching and mapping to surveillance. However, for ...
Grégoire Danoy, Matthias R. Brust, Pascal B...
MSWIM
2015
ACM
2 years 11 months ago
Data Dependency based Parallel Simulation of Wireless Networks
Simulation of wireless systems is highly complex and can only be efficient if the simulation is executed in parallel. To this end, independent events have to be identified to ena...
Mirko Stoffers, Torsten Sehy, James Gross, Klaus W...
MSWIM
2015
ACM
2 years 11 months ago
RFT: Identifying Suitable Neighbors for Concurrent Transmissions in Point-to-Point Communications
Point-to-point tra c has emerged as a widely used communications paradigm for cyber-physical systems and wireless sensor networks in industrial settings. However, existing point-t...
Jin Zhang, Andreas Reinhardt, Wen Hu, Salil S. Kan...
MSWIM
2015
ACM
2 years 11 months ago
Anticipatory Admission Control and Resource Allocation for Media Streaming in Mobile Networks
The exponential growth of media streaming traffic will have a strong impact on the bandwidth consumption of the future wireless infrastructure. One key challenge is to deliver ser...
Nicola Bui, Ilaria Malanchini, Joerg Widmer
MSWIM
2015
ACM
2 years 11 months ago
Inferring Smartphone Positions Based on Collecting the Environment's Response to Vibration Motor Actuation
Smartphones have become ubiquitous in recent years and offer many useful services to their users, such as notifications about incoming calls and messages, or news updates in rea...
Irina Diaconita, Andreas Reinhardt, Delphine Chris...
MSWIM
2015
ACM
2 years 11 months ago
Bounding Degrees on RPL
RPL is an open routing protocol standardized by the ROLL group of IETF for constrained IP smart objects. It is one of the emergent protocols dedicated for Low Power and Lossy Netw...
Fadwa Boubekeur, Lélia Blin, Rémy L&...
MSWIM
2015
ACM
2 years 11 months ago
Deep Inspection of the Noise in WiFi Time-of-Flight Echo Techniques
Time-of-flight (ToF) echo techniques have been proposed to estimate the distance between a local and a target station using regular WiFi radio devices. As of today, there is litt...
Domenico Giustiniano, Theodoros Bourchas, Maciej B...
MSWIM
2015
ACM
2 years 11 months ago
Two Hops or More: On Hop-Limited Search in Opportunistic Networks
While there is a drastic shift from host-centric networking to content-centric networking, how to locate and retrieve the relevant content efficiently, especially in a mobile netw...
Suzan Bayhan, Esa Hyytiä, Jussi Kangasharju, ...
MSWIM
2015
ACM
2 years 11 months ago
Scalable Transportation Monitoring using the Smartphone Road Monitoring (SRoM) System
Our quest for ubiquitous Intelligent Transportation Systems (ITS) is simply infeasible over proprietary systems. In a time of abundant smart devices, it is impractical to consider...
Sam Aleyadeh, Sharief M. A. Oteafy, Hossam S. Hass...
MSWIM
2015
ACM
2 years 11 months ago
Modelling the Bandwidth Allocation Problem in Mobile Service-Oriented Networks
When the services requested by mobile application workflows are distributed over a network of mobile smart devices, the question arises as to which service should be allocated wi...
Bo Gao, Ligang He, Chao Chen
books