Sciweavers

4761 search results - page 832 / 953
» Performance of Protocols
Sort
View
SIGMOBILE
2008
72views more  SIGMOBILE 2008»
14 years 10 months ago
RFID-based networks: exploiting diversity and redundancy
In this article, we outline a research agenda for developing protocols and algorithms for densely populated RFID based systems covering a wide geographic area. This will need mult...
Nitin Vaidya, Samir R. Das
SP
2008
IEEE
14 years 10 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight
IWC
2007
121views more  IWC 2007»
14 years 10 months ago
Eye movements as indices for the utility of life-like interface agents: A pilot study
We motivate an approach to evaluating the utility of life-like interface agents that is based on human eye movements rather than questionnaires. An eye tracker is employed to obta...
Helmut Prendinger, Chunling Ma, Mitsuru Ishizuka
TIT
2008
87views more  TIT 2008»
14 years 10 months ago
Decode-and-Forward Relaying With Quantized Channel State Feedback: An Outage Exponent Analysis
The problem of resource allocation to maximize the outage exponent over a fading relay channel using the decodeand-forward protocol with quantized channel state feedback (CSF) is s...
Thanh Tùng Kim, Giuseppe Caire, Mikael Skog...
TMC
2008
138views more  TMC 2008»
14 years 10 months ago
A Self-Repairing Tree Topology Enabling Content-Based Routing in Mobile Ad Hoc Networks
Content-based routing (CBR) provides a powerful and flexible foundation for distributed applications. Its communication model, based on implicit addressing, fosters decoupling amon...
Luca Mottola, Gianpaolo Cugola, Gian Pietro Picco