Sciweavers

3486 search results - page 245 / 698
» System Design and Networking Protocols for Wireless Position...
Sort
View
122
Voted
PERCOM
2006
ACM
16 years 2 months ago
A Keystroke and Pointer Control Input Interface for Wearable Computers
The widespread adoption of mobile electronic devices and the advent of wearable computing has encouraged the development of compact alternatives to the keyboard and mouse. These i...
Farooq Ahmad, Petr Musílek
111
Voted
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
15 years 8 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen
158
Voted
SIGMETRICS
2011
ACM
229views Hardware» more  SIGMETRICS 2011»
14 years 6 months ago
Model-driven optimization of opportunistic routing
Opportunistic routing aims to improve wireless performance by exploiting communication opportunities arising by chance. A key challenge in opportunistic routing is how to achieve ...
Eric Rozner, Mi Kyung Han, Lili Qiu, Yin Zhang
LCN
2006
IEEE
15 years 9 months ago
Multi-Channel Interference Measurements for Wireless Sensor Networks
Abstract— This paper presents measurements of radio interference using ”Ambient µNode” sensor nodes. We varied distances and frequencies giving us a measure of the amount of...
Özlem Durmaz Incel, Stefan Dulman, Pierre G. ...
ATC
2008
Springer
15 years 5 months ago
Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server
Wireless networks and the voice over Internet protocol (VoIP) have recently been widely adapted. VoIP services over Ad-hoc network can be accomplished by middleware embedded in mob...
Lin-huang Chang, Chun-hui Sung, Shih-yi Chiu, Jiun...