Sciweavers

Share
ICWN
2008
9 years 25 days ago
Heterogeneity in Mobile Computing Environmens
The rapid evolution of mobile computing has spawned a very heterogeneous spectrum of technologies affecting both devices and system in the mobile computing domain. Since mobile com...
Robert Schmohl, Uwe Baumgarten
ICWN
2008
9 years 25 days ago
Behavior of Bluetooth Bridging Nodes within an Adaptive Service Providing Environment
In order to demonstrate our research results on managing wireless networks that are used to provide mobile services with a large spectrum of application, we developed the BlueSpot ...
Ulrich Dümichen, Uwe Baumgarten
ICWN
2008
9 years 25 days ago
Progressive Content-Sensitive Data Retrieval in Sensor Networks
: Problem statement: For a sensor network comprising autonomous and self-organizing data sources, efficient similarity-based search for semantic-rich resources (such as video data)...
Bo Yang, Mareboyana Manohar, Shaoying Kou
ICWN
2008
9 years 25 days ago
Reliability Challenges and Enhancement Approaches for Pipeline Sensor and Actor Networks
- Sensor and actor networks are used to monitor and control pipeline infrastructures. This paper discusses and compares different sensor and actor network architectures for water, ...
Nader Mohamed, Imad Jawhar, Khaled Shuaib
ICWN
2008
9 years 25 days ago
A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks
In our previous work, a highly scalable and faulttolerant network architecture, the Progressive Multi-hop Rotational Clustered (PMRC) structure, is proposed for constructing large...
Qiaoqin Li, Mei Yang, Hongyan Wang, Yingtao Jiang,...
ICWN
2008
9 years 25 days ago
An Access Point Selection Algorithm for Heterogeneous Stations
In wireless LAN technology, access point selection at each station is a critical problem in order to obtain satisfactory throughputs. The current protocol for access point selecti...
Yasuhiro Sagara, Akihiro Fujiwara
ICWN
2008
9 years 25 days ago
A Framework of Authentic Post-Issuance Program Modification for Multi-Application Smart Cards
Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In t...
Mohammad Mesbah Uddin, Salahuddin Muhammad Salim Z...
ICWN
2008
9 years 25 days ago
Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Landslides are one of the environmental disasters that cause massive destruction of human life and infrastructure. Real time monitoring of a landslide prone areas are necessary to...
Ramesh Maneesha, P. Ushakumari
ICWN
2008
9 years 25 days ago
Coverage Efficient Clustering Method Based on Time Delay for Wireless Sensor Networks
Energy efficient operations are essential to increase the lifetime of wireless sensor network. A clustering-based protocol is one approach that reduces energy by a data aggregation...
Ji Gong, Hyuntae Kim, Gihwan Cho
books