Sciweavers

1320 search results - page 64 / 264
» Constraint Based Network Adaptation for Ubiquitous Applicati...
Sort
View
TSP
2011
152views more  TSP 2011»
14 years 7 months ago
Blind Adaptive Constrained Constant-Modulus Reduced-Rank Interference Suppression Algorithms Based on Interpolation and Switched
—This work proposes a blind adaptive reduced-rank scheme and constrained constant-modulus (CCM) adaptive algorithms for interference suppression in wireless communications system...
Rodrigo C. de Lamare, Raimundo Sampaio Neto, Marti...
135
Voted
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 1 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
15 years 6 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio
132
Voted
IWCMC
2010
ACM
15 years 5 months ago
Energy-aware online routing with QoS constraints in multi-rate wireless ad hoc networks
Wireless ad hoc networks consist of hundreds to thousands of mobile nodes that are powered by batteries. To prolong the network operational time, energy conservation in such netwo...
Wei Yang, Weifa Liang, Jun Luo, Wenhua Dou
100
Voted
DEXAW
1998
IEEE
118views Database» more  DEXAW 1998»
15 years 4 months ago
New Object Models for Seamless Transition across Heterogeneous Mobile Environments
In mobile collaborative applications, collaborators may move across heterogeneous environments. This paper proposes object models for seamless transition of collaborators across h...
Anjaneyulu Pasala, D. Janaki Ram