Sciweavers

2268 search results - page 323 / 454
» Modeling wireless shadow networks
Sort
View
CASCON
2003
75views Education» more  CASCON 2003»
15 years 6 months ago
Modeling location-based services with subject spaces
The advance in wireless networks and in positioning systems has led to the development of a new generation of mobile applications: location-based services (LBS). LBS offer highly ...
Hubert Ka Yau Leung, Ioana Burcea, Hans-Arno Jacob...
JSAC
2010
161views more  JSAC 2010»
14 years 12 months ago
Distortion optimal transmission of multi-layered FGS video over wireless channels
Abstract-- We identify an analytical expression for the distortion of a scalable video bitstream containing a Base Layer (BL) and one or more Enhancement Layer (EL) bitstreams. Con...
Negar Nejati, Homayoun Yousefi'zadeh, Hamid Jafark...
180
Voted
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 6 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
156
Voted
AHS
2007
IEEE
202views Hardware» more  AHS 2007»
15 years 5 months ago
PERPLEXUS: Pervasive Computing Framework for Modeling Complex Virtually-Unbounded Systems
This paper introduces Perplexus, a European project that aims to develop a scalable hardware platform made of custom reconfigurable devices endowed with bio-inspired capabilities...
Eduardo Sanchez, Andrés Pérez-Uribe,...
WASA
2009
Springer
165views Algorithms» more  WASA 2009»
15 years 11 months ago
Maximum Independent Set of Links under Physical Interference Model
This paper addresses the following optimization problem in a plane multihop wireless networks under the physical interference model: From a given a set of communication links whose...
Peng-Jun Wan, Xiaohua Jia, F. Frances Yao