Sciweavers

1030 search results - page 170 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
MMM
2005
Springer
148views Multimedia» more  MMM 2005»
15 years 3 months ago
Paving the Last Mile for Multi-Channel Multimedia Presentation Generation
Users of multimedia applications today are equipped with a variety of different (mobile) devices that each come with different operating systems, memory and CPU capabilities, netw...
Ansgar Scherp, Susanne Boll
ADHOC
2007
139views more  ADHOC 2007»
14 years 9 months ago
Bounded-distance multi-clusterhead formation in wireless ad hoc networks
We present a clustering technique addressing redundancy for bounded-distance clusters, which means being able to determine the minimum number of cluster-heads per node, and the ma...
Marco Aurélio Spohn, J. J. Garcia-Luna-Acev...
90
Voted
IJWMC
2007
84views more  IJWMC 2007»
14 years 9 months ago
Towards all-IP wireless networks: architectures and resource management mechanism
Future wireless Internet will consist of different wireless technologies that should operate together in an efficient way to provide seamless connectivity to mobile users. The in...
Majid Ghaderi, Raouf Boutaba
ADB
1994
311views Database» more  ADB 1994»
15 years 1 months ago
A Personal and Portable Database Server: the CQL Card
Database applications and technologies are of central importance in many information systems a person may encounter. To obtain services, the end-users are required a smart card (pl...
Pierre Paradinas, Jean-Jacques Vandewalle
IWCMC
2009
ACM
15 years 4 months ago
On fault tolerant ad hoc network design
Minimal configuration and quick deployment of ad hoc networks make it suitable for numerous applications such as emergency situations, border monitoring, and military missions, e...
Wasim El-Hajj, Hazem Hajj, Zouheir Trabelsi