Sciweavers

738 search results - page 140 / 148
» Security considerations in ad hoc sensor networks
Sort
View
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 3 months ago
Complexity and Error Propagation of Localization Using Interferometric Ranging
— An interferometric ranging technique has been recently proposed as a possible way to localize ad hoc and sensor networks. Compared to the more common techniques such as receive...
Rui Huang, Gergely V. Záruba, Manfred Huber
110
Voted
MOBICOM
2005
ACM
15 years 3 months ago
VITP: an information transfer protocol for vehicular computing
Recent advances in wireless inter-vehicle communication systems enable the development of Vehicular Ad-Hoc Networks (VANET) and create significant opportunities for the deploymen...
Marios D. Dikaiakos, Saif Iqbal, Tamer Nadeem, Liv...
101
Voted
COLCOM
2007
IEEE
15 years 3 months ago
Peer2Schedule - an experimental peer-to-peer application to support present collaboration
Abstract—This paper describes experiences from implementing an experimental mobile peer-to-peer application called Peer2Schedule aimed at improving and supporting collaboration w...
Alf Inge Wang, Peter Nicolai Motzfeldt
DSOM
2005
Springer
15 years 2 months ago
SLA Design from a Business Perspective
Abstract. A method is proposed whereby values for Service Level Objectives (SLOs) of an SLA can be chosen to reduce the sum IT infrastructure cost plus business financial loss. Bu...
Jacques Philippe Sauvé, Filipe Marques, Ant...
INFOCOM
2005
IEEE
15 years 3 months ago
Gossip algorithms: design, analysis and applications
Abstract— Motivated by applications to sensor, peer-topeer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and...
Stephen P. Boyd, Arpita Ghosh, Balaji Prabhakar, D...