Sciweavers

6122 search results - page 1092 / 1225
» Securing network access in wireless sensor networks
Sort
View
ICDCSW
2007
IEEE
15 years 4 months ago
Context to Make You More Aware
The goal of our work is to help users make more informed choices about what physical activities they undertake. One example is to provide relevant information to help someone choo...
Adrienne H. Andrew, Yaw Anokwa, Karl Koscher, Jona...
MOBIDE
2010
ACM
14 years 10 months ago
Power-aware operator placement and broadcasting of continuous query results
Complex event detection over data streams has become ubiquitous through the widespread use of sensors, wireless connectivity and the wide variety of end-user mobile devices. Typic...
Panayiotis Neophytou, Mohamed A. Sharaf, Panos K. ...
ISITA
2010
14 years 7 months ago
Performance analysis and optimal power allocation for hybrid incremental relaying
Relaying technique has been developed considerable attention in response to improve reliability and to extend wireless network coverage. One of conventional relaying technique, inc...
Jaeyoung Lee, Sung-il Kim, Jun Heo
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 4 months ago
Peer-to-Peer Vertical Mobility Management
— With the increasing number of wireless devices, the importance of mobility management in future mobile networks is growing. In addition, the number of access technologies avail...
Ramy Farha, Khashayar Khavari, Alberto Leon-Garcia
ICN
2005
Springer
15 years 3 months ago
Eliminating the Performance Anomaly of 802.11b
Abstract. In this paper, we propose a mechanism to eliminate the performance anomaly of IEEE 802.11b. Performance anomaly happens when nodes that have different transmission rates...
See-hwan Yoo, Jin-Hee Choi, Jae-Hyun Hwang, Chuck ...
« Prev « First page 1092 / 1225 Last » Next »