Sciweavers

256 search results - page 50 / 52
» Power assignment for k-connectivity in wireless ad hoc netwo...
Sort
View
PERCOM
2003
ACM
14 years 6 months ago
Providing Contextual Information to Pervasive Computing Applications
Pervasive computing applications are increasingly leveraging contextual information from several sources to provide users with behavior appropriate to the environment in which the...
Glenn Judd, Peter Steenkiste
SAC
2003
ACM
13 years 11 months ago
TinyGALS: A Programming Model for Event-Driven Embedded Systems
Networked embedded systems such as wireless sensor networks are usually designed to be event-driven so that they are reactive and power efficient. Programming embedded systems wit...
Elaine Cheong, Judith Liebman, Jie Liu, Feng Zhao
CAISE
2003
Springer
13 years 11 months ago
Sharing Mobile Databases in Dynamically Configurable Environments
We define a Mobile Database Community (MDBC) as a dynamic collection of autonomous mobile databases in which each database user can access databases in the community through a wir...
Angelo Brayner, José de Aguiar Moraes Filho
MOBIHOC
2004
ACM
14 years 6 months ago
Towards mobility as a network control primitive
In the near future, the advent of large-scale networks of mobile agents autonomously performing long-term sensing and communication tasks will be upon us. However, using controlle...
David Kiyoshi Goldenberg, Jie Lin, A. Stephen Mors...
GI
2004
Springer
13 years 11 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner