Sciweavers

683 search results - page 67 / 137
» Exploiting Logical Mobility in Mobile Computing Middleware
Sort
View
ICAC
2005
IEEE
15 years 9 months ago
Self-Configuring and Optimizing Mobile Ad Hoc Networks
We present the design and implementation of a working system that enables self-configuration and self-optimization in mobile ad hoc networks (MANETs) by exploiting context awarene...
Apostolos Malatras, George Pavlou, Stylianos Gouve...
122
Voted
CONEXT
2007
ACM
15 years 7 months ago
Experimenting with real-life opportunistic communications using windows mobile devices
Pocket Switched Networks (PSN) is a novel communication paradigm which aims to exploit the opportunistic contacts between mobile devices to exchange data over multiple hops. A key...
Anna Kaisa Pietiläinen, Christophe Diot
133
Voted
MOBIHOC
2003
ACM
16 years 3 months ago
A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks
Directional antennas in ad hoc networks offer many benefits compared with classical omnidirectional antennas. The most important include significant increase of spatial reuse, cov...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...
ENC
2008
IEEE
15 years 10 months ago
Adaptively Brokering Continuous Queries for Exploiting Streams
This paper introduces an approach for adaptively brokering queries for exploiting streams produced and consumed by devices with limited computing and storage capacities. Such devi...
José-Luis Zechinelli-Martini, Thierry Delot...
111
Voted
OPODIS
2007
15 years 5 months ago
Secretive Birds: Privacy in Population Protocols
We study private computations in a system of tiny mobile agents. We consider the mobile population protocol model of Angluin et al. [2] and ask what can be computed without ever re...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...