Sciweavers

2268 search results - page 387 / 454
» Modeling wireless shadow networks
Sort
View
159
Voted
IWCMC
2010
ACM
15 years 9 months ago
Group detection in mobility traces
—Analysis and modeling of wireless networks greatly depend on understanding the structure of underlying mobile nodes. In this paper we present two clustering algorithms to determ...
Yung-Chih Chen, Elisha J. Rosensweig, Jim Kurose, ...
HICSS
2002
IEEE
93views Biometrics» more  HICSS 2002»
15 years 9 months ago
High-Level Executable Specification of the Universal Plug and Play Architecture
Recently, Microsoft took a lead in the development of a standard for peer-to-peer network connectivity of various intelligent appliances, wireless devices and PCs. It is called th...
Uwe Glässer, Yuri Gurevich, Margus Veanes
ICCCN
1998
IEEE
15 years 8 months ago
Comparative Performance Evaluation of Routing Protocols for Mobile, Ad hoc
We evaluate several routing protocols for mobile, wireless, ad hoc networks via packet level simulations. The protocol suite includes routing protocols specifically designed for a...
Samir Ranjan Das, Robert Castañeda, Jiangta...
BROADNETS
2005
IEEE
15 years 6 months ago
Opportunistic power allocation for fading channels with non-cooperative users and random access
— We present a game-theoretical model of a wireless communication system with multiple competing users sharing a multiaccess fading channel. With a specified capture rule and a ...
Jun Sun 0007, Eytan Modiano
132
Voted
COCOA
2008
Springer
15 years 6 months ago
Optimal Movement of Mobile Sensors for Barrier Coverage of a Planar Region
Intrusion detection, area coverage and border surveillance are important applications of wireless sensor networks today. They can be (and are being) used to monitor large unprotec...
Binay K. Bhattacharya, B. Burmester, Yuzhuang Hu, ...