Sciweavers

2268 search results - page 415 / 454
» Modeling wireless shadow networks
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 8 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
MOBISYS
2006
ACM
16 years 4 months ago
Pegboard: a framework for developing mobile applications
Tool support for mobile application development can significantly improve programmer productivity and software quality. Pegboard is a novel tooling framework that extends the Ecli...
Danny Soroker, Ramón Cáceres, Danny ...
GLOBECOM
2009
IEEE
15 years 11 months ago
Multiple Radio Channel Assignement Utilizing Partially Overlapped Channels
— Existing channel assignment algorithms designed for multi-radio multi-channel wireless mesh networks (MRMC-WMN) mainly deal with orthogonal or nonoverlapped channels. But in re...
Mohammad Asadul Hoque, Xiaoyan Hong, Farhana Afroz
RTSS
2008
IEEE
15 years 10 months ago
Fast Sensor Placement Algorithms for Fusion-Based Target Detection
Mission-critical target detection imposes stringent performance requirements for wireless sensor networks, such as high detection probabilities and low false alarm rates. Data fus...
Zhaohui Yuan, Rui Tan, Guoliang Xing, Chenyang Lu,...
WCNC
2008
IEEE
15 years 10 months ago
An Opportunistic Scheduling Scheme with Minimum Data-Rate Guarantees for OFDMA
Abstract—We tackle the problem of providing minimum datarate guarantees for different classes-of-service in an OFDMAbased network, while obtaining a high system throughput. Our a...
Razvan Pitic, Antonio Capone