Sciweavers

153 search results - page 27 / 31
» An experimental study of greedy routing algorithms
Sort
View
ICCAD
1996
IEEE
74views Hardware» more  ICCAD 1996»
15 years 1 months ago
Optimal non-uniform wire-sizing under the Elmore delay model
We consider non-uniform wire-sizing for general routing trees under the Elmore delay model. Three minimization objectives are studied: 1) total weighted sink-delays; 2) total area...
Chung-Ping Chen, Hai Zhou, D. F. Wong
DMSN
2004
ACM
15 years 3 months ago
A framework for spatio-temporal query processing over wireless sensor networks
Wireless sensor networks consist of nodes with the ability to measure, store, and process data, as well as to communicate wirelessly with nodes located in their wireless range. Us...
Alexandru Coman, Mario A. Nascimento, Jörg Sa...
98
Voted
IS
2011
14 years 1 months ago
Detecting proximity events in sensor networks
Sensor networks are often used to perform monitoring tasks, such as animal and vehicle tracking, or the surveillance of enemy forces in military applications. In this paper we int...
Antonios Deligiannakis, Yannis Kotidis
MOBIHOC
2007
ACM
15 years 9 months ago
On exploiting asymmetric wireless links via one-way estimation
A substantial percentage of links in wireless networks, especially low-power ones, is asymmetric. For the low-quality direction of asymmetric links, we observe based on testbed ex...
Lifeng Sang, Anish Arora, Hongwei Zhang
ICDE
2008
IEEE
219views Database» more  ICDE 2008»
15 years 11 months ago
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
Preserving individual privacy when publishing data is a problem that is receiving increasing attention. According to the k-anonymity principle, each release of data must be such th...
Osman Abul, Francesco Bonchi, Mirco Nanni