Sciweavers

1569 search results - page 240 / 314
» Constrained Navigation Environments
Sort
View
SAC
2009
ACM
15 years 11 months ago
NECTAR: a DTN routing protocol based on neighborhood contact history
There are a number of scenarios where connectivity is intermittent, and a given destination may not be reachable at the moment a message is sent. Networks with these characteristi...
Etienne C. R. de Oliveira, Célio V. N. de A...
SAC
2009
ACM
15 years 11 months ago
agentTool process editor: supporting the design of tailored agent-based processes
This paper describes the agentTool Process Editor (APE), an Eclipse plug-in based on the Eclipse Process Framework. The aim of APE is to facilitate the design, verification, and m...
Juan C. García-Ojeda, Scott A. DeLoach, Rob...
DSN
2009
IEEE
15 years 11 months ago
Stretching gossip with live streaming
Gossip-based information dissemination protocols are considered easy to deploy, scalable and resilient to network dynamics. They are also considered highly flexible, namely tunab...
Davide Frey, Rachid Guerraoui, Anne-Marie Kermarre...
SSDBM
2009
IEEE
126views Database» more  SSDBM 2009»
15 years 11 months ago
Comprehensive Optimization of Declarative Sensor Network Queries
We present a novel sensor network query processing architecture that (a) covers all the query optimization phases that are required to map a declarative query to executable code; ...
Ixent Galpin, Christian Y. A. Brenninkmeijer, Farh...
ISCC
2009
IEEE
254views Communications» more  ISCC 2009»
15 years 11 months ago
Monitoring connectivity in wireless sensor networks
It is important to have continuous connectivity in a wireless sensor network after it is deployed in a hostile environment. However, such networks are constrained by the low usert...
Benahmed Khelifa, Hafid Haffaf, Madjid Merabti, Da...