Sciweavers

2580 search results - page 394 / 516
» Systems for human-powered mobile computing
Sort
View
RTSS
2007
IEEE
15 years 10 months ago
Sea Depth Measurement with Restricted Floating Sensors
Sea depth monitoring is a critical task to ensure the safe operation of harbors. Traditional schemes largely rely on labor-intensive work and expensive hardware. This study explor...
Zheng Yang, Mo Li, Yunhao Liu
ICESS
2007
Springer
15 years 10 months ago
An Efficient Buffer Management Scheme for Implementing a B-Tree on NAND Flash Memory
Recently, NAND flash memory has been used for a storage device in various mobile computing devices such as MP3 players, mobile phones and laptops because of its shock-resistant, lo...
Hyun-Seob Lee, Sangwon Park, Ha-Joo Song, Dong-Ho ...
BROADNETS
2005
IEEE
15 years 10 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
EURONGI
2004
Springer
15 years 9 months ago
Admission Control in the Downlink of WCDMA/UMTS
In this paper, we develop a novel CAC algorithm that takes into account the mobility of users inside the cell with a focus on the downlink of third generation mobile systems. We ï¬...
Salah-Eddine Elayoubi, Tijani Chahed
APCSAC
2003
IEEE
15 years 9 months ago
A Router Architecture to Achieve Link Rate Throughput in Suburban Ad-hoc Networks
Static nodes, e.g. houses, educational institutions etc, can comprise ad-hoc networks using off-the-self wireless technologies with a view to bypass expensive telecommunication so...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp