Sciweavers

2268 search results - page 351 / 454
» Modeling wireless shadow networks
Sort
View
SIMUTOOLS
2008
15 years 6 months ago
ns-2 vs. OPNET: a comparative study of the IEEE 802.11e technology on MANET environments
In this work we present the results of a comparative study between two well-known network simulators: ns-2 and OPNET Modeler. In particular, we focus on a performance evaluation o...
P. Pablo Garrido, Manuel P. Malumbres, Carlos Migu...
150
Voted
MSWIM
2005
ACM
15 years 10 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
148
Voted
DATE
2005
IEEE
143views Hardware» more  DATE 2005»
15 years 10 months ago
galsC: A Language for Event-Driven Embedded Systems
— We introduce galsC, a language designed for programming event-driven embedded systems such as sensor networks. galsC implements the TinyGALS programming model. At the local lev...
Elaine Cheong, Jie Liu
MTA
2011
220views Hardware» more  MTA 2011»
14 years 12 months ago
Modeling, simulation, and practice of floor control for synchronous and ubiquitous collaboration
: With the advances in a variety of software/hardware technologies and wireless networking, there is coming a need for ubiquitous collaboration which allows people to access inform...
Kangseok Kim, Geoffrey C. Fox
PERCOM
2008
ACM
16 years 4 months ago
Information Agents for Pervasive Sensor Networks
In this paper, we describe an information agent, that resides on a mobile computer or personal digital assistant (PDA), that can autonomously acquire sensor readings from pervasiv...
Alex Rogers, Mike Osborne, Sarvapali D. Ramchurn, ...