Sciweavers

10044 search results - page 1917 / 2009
» Authentication in Wireless Networks
Sort
View
GLOBECOM
2007
IEEE
15 years 10 months ago
Information Transmission Over Fading Channels
Abstract— We consider the lossy transmission of source information over Rayleigh fading channels. We investigate the utility of two channel capacity definitions, ergodic capacit...
Sayantan Choudhury, Jerry D. Gibson
IPPS
2005
IEEE
15 years 10 months ago
Energy-Aware Task Scheduling: Towards Enabling Mobile Computing over MANETs
Enabling high performance, persistent mobile computing has recently become a very active research area. The widespread popularity of mobile computing devices, such as laptops, han...
Waleed Alsalih, Selim G. Akl, Hossam S. Hassanein
WOWMOM
2005
ACM
109views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
A High-Throughput MAC Strategy for Next-Generation WLANs
WLAN technology has been shown a revolutionary development during the last decade. Recently popularized IEEE 802.11a/gbased products can support up to 54 Mbps PHY (Physical layer)...
Seongkwan Kim, Youngsoo Kim, Sunghyun Choi, Kyungh...
SAC
2009
ACM
15 years 9 months ago
Impact of function inlining on resource-constrained embedded systems
With the development of computer systems, function inlining schemes were used to reduce execution time while increasing codes. In embedded systems such as wireless sensor nodes, t...
Bongjae Kim, Sangho Yi, Yookun Cho, Jiman Hong
ATAL
2008
Springer
15 years 6 months ago
An embodied conversational agent as a lifestyle advisor
Persistent Embodied Conversational Agents (ECA) can be used to assist users in their daily activities. We introduce the Health and Fitness Companion (HFC), which is a conversation...
Cameron Smith, Daniel Charlton, Li Zhang, Marc Cav...
« Prev « First page 1917 / 2009 Last » Next »