Sciweavers

2268 search results - page 432 / 454
» Modeling wireless shadow networks
Sort
View
TMC
2010
130views more  TMC 2010»
15 years 7 days ago
Efficient Coverage Maintenance Based on Probabilistic Distributed Detection
—Many wireless sensor networks require sufficient sensing coverage over long periods of time. To conserve energy, a coverage maintenance protocol achieves desired coverage by act...
Guoliang Xing, Xiangmao Chang, Chenyang Lu, Jianpi...
125
Voted
MOBISYS
2005
ACM
16 years 1 months ago
LiveMail: personalized avatars for mobile entertainment
LiveMail is a prototype system that allows mobile subscribers to communicate using personalized 3D face models created from images taken by their phone cameras. The user takes a s...
Miran Mosmondor, Tomislav Kosutic, Igor S. Pandzic
CORR
2007
Springer
130views Education» more  CORR 2007»
15 years 1 months ago
An Autonomous Distributed Admission Control Scheme for IEEE 802.11 DCF
Admission control as a mechanism for providing QoS requires an accurate description of the requested flow as well as already admitted flows. Since 802.11 WLAN capacity is shared...
Preetam Patil, Varsha Apte
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
15 years 8 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...
MOBISYS
2008
ACM
16 years 1 months ago
Composcan: adaptive scanning for efficient concurrent communications and positioning with 802.11
Using 802.11 concurrently for communications and positioning is problematic, especially if location-based services (e.g., indoor navigation) are concurrently executed with real-ti...
Mikkel Baun Kjærgaard, Thomas King