Sciweavers

10044 search results - page 1954 / 2009
» Authentication in Wireless Networks
Sort
View
JCM
2006
85views more  JCM 2006»
14 years 11 months ago
Round-trip Time Variation in SmoothTCP in the Face of Spurious Errors
In this paper, we review the definition of a variant of TCP, called SmoothTCP, and describe one of its versions which uses ICMP-SQ messages as its primary control metric. This vers...
Elvis Vieira, Michael Bauer
KES
2008
Springer
14 years 11 months ago
The PERPLEXUS bio-inspired hardware platform: A flexible and modular approach
This paper introduces the Perplexus hardware platform, a scalable computing substrate made of custom reconfigurable devices endowed with bio-inspired capabilities. This platform w...
Andres Upegui, Yann Thoma, Eduardo Sanchez, Andr&e...
PE
2008
Springer
113views Optimization» more  PE 2008»
14 years 11 months ago
Joint uplink and downlink admission control to both streaming and elastic flows in CDMA/HSDPA systems
TCP-based data flows generate packets and ACKs in two directions, be it in the wireline or wireless networks. In the latter case, packets are typically found in the downlink where...
Tijani Chahed, Eitan Altman, Salah-Eddine Elayoubi
PERVASIVE
2006
Springer
14 years 11 months ago
Collaborative Localization: Enhancing WiFi-Based Position Estimation with Neighborhood Links in Clusters
Abstract. Location-aware services can benefit from accurate and reliable indoor location tracking. The widespread adoption of 802.11x wireless LAN as the network infrastructure cre...
Li-Wei Chan, Ji-Rung Chiang, Yi-Chao Chen, Chia-na...
SIGKDD
2008
149views more  SIGKDD 2008»
14 years 11 months ago
Knowledge discovery from sensor data (SensorKDD)
Wide-area sensor infrastructures, remote sensors, RFIDs, and wireless sensor networks yield massive volumes of disparate, dynamic, and geographically distributed data. As such sen...
Ranga Raju Vatsavai, Olufemi A. Omitaomu, Joao Gam...
« Prev « First page 1954 / 2009 Last » Next »