Sciweavers

2268 search results - page 417 / 454
» Modeling wireless shadow networks
Sort
View
CN
2007
105views more  CN 2007»
15 years 4 months ago
Flow-level QoS for a dynamic load of rate adaptive sessions sharing a bottleneck link
We consider the flow-level quality of service (QoS) seen by a dynamic load of rate adaptive sessions sharing a bottleneck link based on fair share bandwidth allocation. This is o...
Steven Weber, Gustavo de Veciana
PERCOM
2004
ACM
16 years 4 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
PERCOM
2003
ACM
16 years 4 months ago
PILGRIM: A Location Broker and Mobility-Aware Recommendation System
Mobile computing adds a mostly unexplored dimension to data mining: user's position is a relevant piece of information, and recommendation systems, selecting and ranking link...
Mauro Brunato, Roberto Battiti
146
Voted
MOBISYS
2005
ACM
16 years 4 months ago
Deploying and evaluating a location-aware system
Location-aware systems are typically deployed on a small scale and evaluated technically, in terms of absolute errors. In this paper, the authors present their experience of deplo...
Robert K. Harle, Andy Hopper
WOWMOM
2005
ACM
90views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
Saturation Throughput Analysis of a System of Interfering IEEE 802.11 WLANs
IEEE 802.11 wireless local area networks that span large buildings or campuses must comprise multiple cells, several of which must necessarily be cochannel cells. It can be shown ...
Manoj K. Panda, Anurag Kumar, S. H. Srinivasan