Sciweavers

1383 search results - page 247 / 277
» Analysis of a Metropolitan-Area Wireless Network
Sort
View
118
Voted
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 5 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
128
Voted
TJS
2002
144views more  TJS 2002»
15 years 1 months ago
TCP Performance and Behaviors with Local Retransmissions
TCP has been the dominant transport protocol over the global Internet, and its performance over a hybrid wireless/wireline network has attracted much attention in recent years. Thi...
Jianping Pan, Jon W. Mark, Sherman X. Shen
113
Voted
ISCC
2002
IEEE
135views Communications» more  ISCC 2002»
15 years 6 months ago
End-to-end versus explicit feedback measurement in 802.11 networks
Higher layer protocols in wireless networks need to dynamically adapt to observed network response. The common approach is that each session employs end-to-end monitoring to estim...
Manthos Kazantzidis, Mario Gerla
PERCOM
2008
ACM
16 years 1 months ago
Location Fingerprint Analyses Toward Efficient Indoor Positioning
Abstract--Analytical models to evaluate and predict "precision" performance of indoor positioning systems based on location fingerprinting are lacking. Such models can be...
Nattapong Swangmuang, Prashant Krishnamurthy
120
Voted
PERCOM
2005
ACM
16 years 1 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste