Sciweavers

2572 search results - page 513 / 515
» Identification in Ad Hoc Networks
Sort
View
ATAL
2008
Springer
14 years 11 months ago
An adaptive probabilistic trust model and its evaluation
In open settings, the participants are autonomous and there is no central authority to ensure the felicity of their interactions. When agents interact in such settings, each relie...
Chung-Wei Hang, Yonghong Wang, Munindar P. Singh
CHI
2005
ACM
14 years 11 months ago
Urban probes: encountering our emerging urban atmospheres
Urban Atmospheres captures a unique, synergistic moment – expanding urban populations, rapid adoption of Bluetooth mobile devices, tiny ad hoc sensor networks, and the widesprea...
Eric Paulos, Tom Jenkins
110
Voted
AHSWN
2008
163views more  AHSWN 2008»
14 years 9 months ago
Control Frame Shaping in Power Controlled and Directional MAC Protocols?
This paper discusses the ideal shapes of control frames (i.e., RTS/CTS frames) in the IEEE 802.11 MAC layer for efficient power control and directional beam forming in mobile ad h...
Fei Dai, Jie Wu
ENTCS
2006
180views more  ENTCS 2006»
14 years 9 months ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...
CORR
2007
Springer
146views Education» more  CORR 2007»
14 years 9 months ago
The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preserv...
Catherine C. Marshall, Sara A. Bly, Francoise Brun...