Sciweavers

394 search results - page 28 / 79
» Practically Coordinating
Sort
View
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
15 years 11 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
COORDINATION
2009
Springer
15 years 10 months ago
Mobility Models and Behavioural Equivalence for Wireless Networks
In protocol development for wireless systems, the choice of appropriate mobility models describing the movement patterns of devices has long been recognised as a crucial factor for...
Jens Chr. Godskesen, Sebastian Nanz
EWSN
2009
Springer
15 years 10 months ago
A Better Choice for Sensor Sleeping
Sensor sleeping is a widely-used and cost-effective technique to save energy in wireless sensor networks. Protocols at different stack levels can, either individually or simultaneo...
Ou Yang, Wendi Rabiner Heinzelman
CHI
2007
ACM
15 years 10 months ago
Task and social visualization in software development: evaluation of a prototype
As open source development has evolved, differentiation of roles and increased sophistication of collaborative processes has occurred. Recently, we described coordination issues i...
Jason B. Ellis, Shahtab Wahid, Catalina Danis, Wen...
CIRA
2007
IEEE
130views Robotics» more  CIRA 2007»
15 years 4 months ago
Compliant Formation Control of a Multi-Vehicle System
— This research identifies a strategy called compliant formation control, which may be used to coordinate the navigational structure of a team of autonomous vehicles. This techni...
Erica Z. MacArthur, Carl D. Crane III