Sciweavers

UIC
2007
Springer
13 years 10 months ago
A Peer-to-Peer Semantic-Based Service Discovery Method for Pervasive Computing Environment
The paper proposes a novel distributed service discovery method for the pervasive computing environment. The method is based on the concept of small world, policy-based advertiseme...
Baopeng Zhang, Yuanchun Shi, Xin Xiao
UIC
2007
Springer
13 years 10 months ago
Mesh-Based Sensor Relocation for Coverage Maintenance in Mobile Sensor Networks
Abstract. Sensor relocation protocols can be employed as fault tolerance approach to offset the coverage loss caused by node failures. We introduce a novel localized structure, in...
Xu Li, Nicola Santoro, Ivan Stojmenovic
MSN
2007
Springer
160views Sensor Networks» more  MSN 2007»
13 years 10 months ago
Access Scheduling on the Control Channels in TDMA Wireless Mesh Networks
The access scheduling on the control channels in TDMA wireless mesh networks is studied in this paper. The problem is to assign time-slots for each node in the network to access th...
Hongju Cheng, Xiaohua Jia, Hai Liu
MFCS
2007
Springer
13 years 10 months ago
On Approximation of Bookmark Assignments
Consider a rooted directed acyclic graph G = (V, E) with root r, representing a collection V of web pages connected via a set E of hyperlinks. Each node v is associated with the pr...
Yuichi Asahiro, Eiji Miyano, Toshihide Murata, Hir...
ICOIN
2007
Springer
13 years 10 months ago
Analyzing and Modeling Router-Level Internet Topology
Measurement studies on the Internet topology show that connectivities of nodes exhibit power–law attribute, but it is apparent that only the degree distribution does not determin...
Ryota Fukumoto, Shin'ichi Arakawa, Tetsuya Takine,...
ESAS
2007
Springer
13 years 10 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...
ADBIS
2007
Springer
117views Database» more  ADBIS 2007»
13 years 10 months ago
Improving the Performance of M-Tree Family by Nearest-Neighbor Graphs
The M-tree and its variants have been proved to provide an efficient similarity search in database environments. In order to further improve their performance, in this paper we pro...
Tomás Skopal, David Hoksza
SECON
2007
IEEE
13 years 10 months ago
MAC-Layer Capture: A Problem in Wireless Mesh Networks using Beamforming Antennas
— Beamforming antennas have been shown to improve spatial reuse in wireless networks. Protocols that aim to exploit beamforming antennas have leveraged benefits from directional...
Romit Roy Choudhury, Nitin H. Vaidya
SECON
2007
IEEE
13 years 10 months ago
Two-hop Relaying in Random Networks with Limited Channel State Information
— In this paper we study two-hop cooperative diversity relaying in random wireless networks. In contrast to most work on cooperative diversity relaying where the relay node posit...
Furuzan Atay Onat, Dan Avidor, Sayandev Mukherjee
SECON
2007
IEEE
13 years 10 months ago
A Framework for Resilient Online Coverage in Sensor Networks
—We consider surveillance applications in which sensors are deployed in large numbers to improve coverage fidelity. Previous research has studied how to select active sensor cov...
Ossama Younis, Marwan Krunz, Srinivasan Ramasubram...