Sciweavers

8377 search results - page 1625 / 1676
» Scenarios - Introduction
Sort
View
WINET
2002
144views more  WINET 2002»
14 years 11 months ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
CORR
2010
Springer
70views Education» more  CORR 2010»
14 years 11 months ago
Simultaneous communication in noisy channels
A sender wishes to broadcast a message of length n over an alphabet of size k to r users, where each user i, 1 i r should be able to receive one of possible mi messages. The cha...
Amit Weinstein
CORR
2010
Springer
118views Education» more  CORR 2010»
14 years 11 months ago
Large scale probabilistic available bandwidth estimation
The common utilization-based definition of available bandwidth and many of the existing tools to estimate it suffer from several important weaknesses: i) most tools report a point...
Frederic Thouin, Mark Coates, Michael G. Rabbat
NETWORK
2007
163views more  NETWORK 2007»
14 years 11 months ago
A Cross-Layering Design for IPv6 Fast Handover Support in an IEEE 802.16e Wireless MAN
Broadband wireless access networks, such as the IEEE 802.16 standard for wireless metropolitan area networks (WMANs), aim to provide high bandwidth, low-cost, scalable solutions t...
Youn-Hee Han, Heejin Jang, JinHyeock Choi, Byungjo...
NETWORK
2007
234views more  NETWORK 2007»
14 years 11 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
« Prev « First page 1625 / 1676 Last » Next »