Sciweavers

5446 search results - page 992 / 1090
» Mobile computing
Sort
View
122
Voted
ADHOCNOW
2008
Springer
15 years 9 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
ICC
2007
IEEE
150views Communications» more  ICC 2007»
15 years 9 months ago
Utility-based Optimal Rate Allocation for Heterogeneous Wireless Multicast
Abstract— Heterogeneous multicast is an efficient communication scheme especially for multimedia applications running over multihop networks when multicast receivers in the same...
Amr M. Mohamed, Hussein M. Alnuweiri
149
Voted
ICNP
2007
IEEE
15 years 9 months ago
Multicast Algorithms for Multi-Channel Wireless Mesh Networks
— Multicast is a key technology that provides efficient data communication among a set of nodes for wireless multi-hop networks. In sensor networks and MANETs, multicast algorit...
Guo-Kai Zeng, Bo Wang 0001, Yong Ding, Li Xiao, Ma...
ICRA
2007
IEEE
111views Robotics» more  ICRA 2007»
15 years 9 months ago
Upper body posture estimation for standing function restoration
— This paper addresses the problem of restoring standing in paralegia via functional electrical stimulation (FES) and investigates the relashionship between body posture and volu...
Gael Pages, Nacim Ramdani, Philippe Fraisse, David...
124
Voted
IROS
2007
IEEE
162views Robotics» more  IROS 2007»
15 years 9 months ago
Where is your dive buddy: tracking humans underwater using spatio-temporal features
— We present an algorithm for underwater robots to track mobile targets, and specifically human divers, by detecting periodic motion. Periodic motion is typically associated wit...
Junaed Sattar, Gregory Dudek