Sciweavers

2268 search results - page 359 / 454
» Modeling wireless shadow networks
Sort
View
INFOCOM
2012
IEEE
13 years 7 months ago
Link correlation aware opportunistic routing
—By exploiting reception diversity of wireless network links, researchers have shown that opportunistic routing can improve network performance significantly over traditional ro...
Anas Basalamah, Song Min Kim, Shuo Guo, Tian He, Y...
CIDR
2007
141views Algorithms» more  CIDR 2007»
15 years 6 months ago
Data-Driven Processing in Sensor Networks
Wireless sensor networks are poised to enable continuous data collection on unprecedented scales, in terms of area location and size, and frequency. This is a great boon to field...
Adam Silberstein, Gregory Filpus, Kamesh Munagala,...
PERCOM
2009
ACM
16 years 5 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
PERCOM
2006
ACM
16 years 4 months ago
Balancing Autonomy and User Control in Context-Aware Systems - a Survey
Application autonomy can reduce interactions with users, ease the use of the system, and decrease user distraction. On the other hand, users may feel loss of control over their ap...
Bob Hardian, Jadwiga Indulska, Karen Henricksen
110
Voted
MSWIM
2009
ACM
15 years 11 months ago
On power and energy trends of IEEE 802.11n PHY
The main contribution of this work is to decipher the power and energy characteristics of IEEE 802.11 PHY. In this work, we implement an IEEE 802.11n receiver and transmitter benc...
Balaji V. Iyer, Thomas M. Conte