We consider the problem of exploring an anonymous unoriented ring of size n by k identical, oblivious, asynchronous mobile robots, that are unable to communicate, yet have the abil...
Anissa Lamani, Maria Gradinariu Potop-Butucaru, S&...
—In wireless networks, node cooperation has been exploited as a data relaying mechanism for decades. However, the wireless channel allows for much richer interaction among nodes....
—In this paper we analyze multiple wireless LAN (WLAN) traces from university and corporate campuses. In particular, we consider an important event between mobile nodes in wirele...
As data sources become larger and more complex, the ability to effectively explore and analyze patterns amongst varying sources becomes a critical bottleneck in analytic reasoning...
Ross Maciejewski, Stephen Rudolph, Ryan Hafen, Ahm...
—This paper exploits the use of location information of wireless terminals to improve the performance of a beamforming system and support multiple access. Based on a system provi...
Congzheng Han, Matthew Webb, Angela Doufexi, Mark ...