Sciweavers

MOBIQUITOUS
2007
IEEE
13 years 10 months ago
High Performance AODV Routing Protocol for Hybrid Wireless Mesh Networks
– Hybrid Wireless Mesh Networks are wireless multi-hop networks consisting of two types of nodes, Mesh Routers and Mesh Clients. Mesh Routers are more static and less resource co...
Asad Amir Pirzada, Marius Portmann
MOBIQUITOUS
2007
IEEE
13 years 10 months ago
Combining GPS and GSM Cell-ID positioning for Proactive Location-based Services
—Mobile terminals with built-in GPS receivers are becoming more and more available, thus the public deployment of location-based services (LBS) becomes feasible. Upcoming LBS are...
Nico Deblauwe, Peter Ruppel
MOBIQUITOUS
2007
IEEE
13 years 10 months ago
The Analysis of Publish/Subscribe Systems over Mobile Wireless Ad Hoc Networks
In this work, we analyze the publish/subscribe distributed system paradigm over mobile ad hoc networks with respect to the performance and the impact of different mobility speeds ...
Thadpong Pongthawornkamol, Klara Nahrstedt, Guijun...
MOBIQUITOUS
2007
IEEE
13 years 10 months ago
Battery-Aware Embedded GPS Receiver Node
—This paper discusses the design and implementation of an ultra low power embedded GPS receiver node for use in remote monitoring situations where battery life is of the utmost i...
Dejan Raskovic, David Giessel
MOBIQUITOUS
2007
IEEE
13 years 10 months ago
Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes
—The skip graph, an application-layer data structure for routing and indexing, may be used in a sensor network to facilitate queries of the distributed k-dimensional data collect...
Gregory J. Brault, Christopher J. Augeri, Barry E....
MOBIQUITOUS
2007
IEEE
13 years 10 months ago
Diffusion-based Approach to Deploying Wireless Sensors to Satisfy Coverage, Connectivity and Reliability
An important objective of wireless sensor networks (WSNs) is to reliably sense data about the environment in which they are deployed. Reliability in WSNs has been widely studied in...
Renita Machado, Sirin Tekinay
MOBIQUITOUS
2007
IEEE
13 years 10 months ago
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks
— Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the trans...
Mooi Choo Chuah, Peng Yang, Jianbin Han
MOBIQUITOUS
2007
IEEE
13 years 10 months ago
Using Semantic Policies to Reason over User Availability
— According to the IETF definition, “presence conveys the ability and willingness of a user to communicate across a set of devices”. In this paper we use semantic techniques ...
Sandford Bessler, Joachim Zeiss
MOBIQUITOUS
2007
IEEE
13 years 10 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra
MOBIQUITOUS
2007
IEEE
13 years 10 months ago
Design and Evaluation of a Hybrid Physical Space Service for Pervasive Computing Applications
Abstract— In this paper we present the design and implementation of a space service that gives pervasive computing applications both a hierarchical and coordinate-based view of p...
Nancy Miller, Peter Steenkiste