Sciweavers

7379 search results - page 1195 / 1476
» Distributed vector architectures
Sort
View
MOBIHOC
2009
ACM
16 years 4 months ago
Characterizing the exit process of a non-saturated IEEE 802.11 wireless network
In this paper, we consider a non-saturated IEEE 802.11 based wireless network. We use a three-way fixed point to model the node behavior with Bernoulli packet arrivals and determi...
Punit Rathod, Onkar Dabeer, Abhay Karandikar, Anir...
VLSID
2006
IEEE
129views VLSI» more  VLSID 2006»
16 years 4 months ago
A Stimulus-Free Probabilistic Model for Single-Event-Upset Sensitivity
With device size shrinking and fast rising frequency ranges, effect of cosmic radiations and alpha particles known as Single-Event-Upset (SEU), Single-Eventtransients (SET), is a ...
Mohammad Gh. Mohammad, Laila Terkawi, Muna Albasma...
SIGMOD
2004
ACM
130views Database» more  SIGMOD 2004»
16 years 4 months ago
Semantically Enriched Web Services for the Travel Industry
Today, the travel information services are dominantly provided by Global Distribution Systems (GDS). The Global Distribution Systems provide access to real time availability and p...
Asuman Dogac, Yildiray Kabak, Gokce Laleci, Siyame...
MOBISYS
2008
ACM
16 years 3 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
MOBIHOC
2008
ACM
16 years 3 months ago
Strong barrier coverage of wireless sensor networks
Constructing sensor barriers to detect intruders crossing a randomly-deployed sensor network is an important problem. Early results have shown how to construct sensor barriers to ...
Benyuan Liu, Olivier Dousse, Jie Wang, Anwar Saipu...
« Prev « First page 1195 / 1476 Last » Next »