Sciweavers

WIMOB
2008
IEEE
13 years 11 months ago
Precoder Designs for MIMO Broadcast Channels with Imperfect CSI
—In this paper, we propose two robust precoder designs for multiple-input multiple-output (MIMO) broadcast channels with imperfect channel state information (CSI). First, we cons...
P. Ubaidulla, Ananthanarayanan Chockalingam
WIMOB
2008
IEEE
13 years 11 months ago
Using LED Lighting for Ubiquitous Indoor Wireless Networking
—Wireless networking is currently dominated by radio frequency (RF) techniques. However, the soon-to-be ubiquity of LED-based lighting motivated by significant energy savings pro...
Thomas D. C. Little, Peter Dib, Kandarp Shah, Nick...
WIMOB
2008
IEEE
13 years 11 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
WMCSA
2009
IEEE
13 years 11 months ago
A case for application aware channel access in wireless networks
The increasing reliance of users on wireless networks for Internet connectivity has posed two significant challenges for mobile networking research. The first challenge is to pr...
Ashish Sharma, Elizabeth M. Belding
WMCSA
2009
IEEE
13 years 11 months ago
LiveCompare: grocery bargain hunting through participatory sensing
Many consumers are misled into paying high prices due to the search costs associated with attaining price information [16]. The popularity of bargain-hunting web sites like Slickd...
Linda Deng, Landon P. Cox
WMCSA
2009
IEEE
13 years 11 months ago
We saw each other on the subway: secure, anonymous proximity-based missed connections
There is an inherent tension between the value provided by Location-Based Services (LBSs) and the location-privacy concerns they raise. Unfortunately, users are often forced to ei...
Justin Manweiler, Ryan Scudellari, Zachary Cancio,...
WMCSA
2009
IEEE
13 years 11 months ago
Experimenting in mobile social contexts using JellyNets
Programmable consumer devices have placed computation within arm’s reach at all times and in all places. Unfortunately, researchers interested in investigating this phenomenon o...
Peter Gilbert, Eduardo Cuervo, Landon P. Cox
WMCSA
2009
IEEE
13 years 11 months ago
Enabling new mobile applications with location proofs
Location is rapidly becoming the next “killer application” as location-enabled mobile handheld devices proliferate. One class of applications that has yet-to-emerge are those ...
Stefan Saroiu, Alec Wolman
WMCSA
2009
IEEE
13 years 11 months ago
BALANCE: towards a usable pervasive wellness application with accurate activity inference
Technology offers the potential to objectively monitor people‘s eating and activity behaviors and encourage healthier lifestyles. BALANCE is a mobile phone-based system for long...
Tamara Denning, Adrienne H. Andrew, Rohit Chaudhri...
WMCSA
2009
IEEE
13 years 11 months ago
Context-aware composition
Context–Aware Composition is a technique to overcome the complexity of wireless discovery, device selection, and establishing connections to other computers in an environment wh...
Kent Lyons, Roy Want, David Munday, Jiasheng He, S...