Existing file access predictors keep track of previous file access patterns and rely on a single heuristic to predict which of the previous successors to the file being currently ...
Abstract—In this paper, we analyze three opportunistic multichannel MAC protocols that associate a newcoming terminal station to one of the access points available within its tra...
Automatic shape acquisition technologies evolved rapidly in recent years, and huge mass of 3D data can be easily produced. The high accuracy of range scanning technology makes the...
Marco Callieri, Federico Ponchio, Paolo Cignoni, R...
Recent work demonstrates that directional antennas have significant potential to improve wireless network capacity in indoor environments. This paper provides a broader exploratio...
Xi Liu, Anmol Sheth, Michael Kaminsky, Konstantina...
The Drive-thru Internet architecture allows exploiting intermittent connectivity by temporarily connecting to IEEE 802.11 WLAN access points at the roadside from moving vehicles. T...