Sciweavers

1102 search results - page 95 / 221
» Interference and Communications among Active Network Applica...
Sort
View
98
Voted
ISM
2006
IEEE
132views Multimedia» more  ISM 2006»
15 years 18 days ago
BM-ALM: An Application Layer Multicasting with Behavior Monitoring Approach
IP multicasting is the most efficient way to perform group data distribution, as it eliminates traffic redundancy and improves bandwidth utilization. Application Layer Multicast (...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
78
Voted
EUC
2005
Springer
15 years 6 months ago
PULSE: A MAC Protocol for RFID Networks
1 The reader collision problem occurs when the signal from one reader interferes with the signal from other readers. Solutions like RTS-CTS are not applicable because a reader may ...
Shailesh M. Birari, Sridhar Iyer
118
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Optimal SINR-based Random Access
— Random access protocols, such as Aloha, are commonly modeled in wireless ad-hoc networks by using the protocol model. However, it is well-known that the protocol model is not a...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong, Robe...
128
Voted
ICONFERENCE
2011
14 years 7 months ago
Coordinating the ordinary: social information uses of Facebook by adults
Social network sites (SNSs) are bundles of information and communication tools that can be used to support collaboration, among other uses. In a qualitative study of adult Faceboo...
Donghee Yvette Wohn, Cliff Lampe, Jessica Vitak, N...
86
Voted
ICMCS
1999
IEEE
89views Multimedia» more  ICMCS 1999»
15 years 4 months ago
A Lightweight Protocol for Interconnecting Heterogeneous Devices in Dynamic Environments
In the near future people will be able to move freely and still have seamless network and Internet connectivity. One implication of this new style of interaction is an increased d...
Kevin C. Almeroth, Katia Obraczka, Dante DeLucia