Sciweavers

661 search results - page 127 / 133
» Connectivity of Wireless Sensor Networks with Constant Densi...
Sort
View
ICDCS
2011
IEEE
13 years 9 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...
PODS
2008
ACM
159views Database» more  PODS 2008»
15 years 9 months ago
Approximation algorithms for clustering uncertain data
There is an increasing quantity of data with uncertainty arising from applications such as sensor network measurements, record linkage, and as output of mining algorithms. This un...
Graham Cormode, Andrew McGregor
TEI
2009
ACM
173views Hardware» more  TEI 2009»
15 years 4 months ago
xtel: a development environment to support rapid prototyping of "ubiquitous content"
This paper describes the "xtel" development environment for "Ubiquitous Content". Ubiquitous contents are real space applications that are embedded in day-to-d...
Satoru Tokuhisa, Takaaki Ishizawa, Yoshimasa Niwa,...
FOCS
2008
IEEE
15 years 4 months ago
Some Results on Greedy Embeddings in Metric Spaces
Geographic Routing is a family of routing algorithms that uses geographic point locations as addresses for the purposes of routing. Such routing algorithms have proven to be both ...
Ankur Moitra, Tom Leighton
WINET
2002
169views more  WINET 2002»
14 years 9 months ago
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments
In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become c...
Lalana Kagal, Vlad Korolev, Sasikanth Avancha, Anu...