Sciweavers

2268 search results - page 427 / 454
» Modeling wireless shadow networks
Sort
View
CEC
2010
IEEE
14 years 12 months ago
The one-commodity traveling salesman problem with selective pickup and delivery: An ant colony approach
We introduce a novel combinatorial optimization problem: the one-commodity traveling salesman problem with selective pickup and delivery (1-TSP-SELPD), characterized by the fact th...
Rafael Falcón, Xu Li, Amiya Nayak, Ivan Sto...
103
Voted
IMC
2010
ACM
14 years 11 months ago
On the feasibility of effective opportunistic spectrum access
Dynamic spectrum access networks are designed to allow today's bandwidth hungry "secondary devices" to share spectrum allocated to legacy devices, or "primary ...
Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haita...
NOSSDAV
2004
Springer
15 years 7 months ago
Energy-aware video streaming with QoS control for portable computing devices
We propose an energy-aware video streaming system for portable computing devices, in which the video can be played back for the specified duration within the remaining battery am...
Morihiko Tamai, Tao Sun, Keiichi Yasumoto, Naoki S...
123
Voted
MOBISYS
2006
ACM
16 years 1 months ago
ARIADNE: a dynamic indoor signal map construction and localization system
Location determination of mobile users within a building has attracted much attention lately due to its many applications in mobile networking including network intrusion detectio...
Yiming Ji, Saad Biaz, Santosh Pandey, Prathima Agr...
CCS
2009
ACM
15 years 8 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...