Sciweavers

2362 search results - page 410 / 473
» The wireless network jamming problem
Sort
View
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
15 years 10 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker
ECUMN
2004
Springer
15 years 8 months ago
Fast Handoff Algorithm Using Access Points with Dual RF Modules
With the spread of portable computers, mobile users rapidly increase and have growing interests in wireless LAN (WLAN). However, when a mobile node (MN) moves, handoff can frequent...
Chun-Su Park, Hye-Soo Kim, Sang-Hee Park, Kyunghun...
FSR
2003
Springer
251views Robotics» more  FSR 2003»
15 years 10 months ago
Distributed Search and Rescue with Robot and Sensor Teams
We develop a network of distributed mobile sensor systems as a solution to the emergency response problem. The mobile sensors are inside a building and they form a connected ad-ho...
George Kantor, Sanjiv Singh, Ronald A. Peterson, D...
MOBIHOC
2008
ACM
16 years 4 months ago
Delegation forwarding
Mobile opportunistic networks are characterized by unpredictable mobility, heterogeneity of contact rates and lack of global information. Successful delivery of messages at low co...
Vijay Erramilli, Mark Crovella, Augustin Chaintrea...
GIS
2008
ACM
16 years 5 months ago
Using tomography for ubiquitous sensing
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...
Stacy Patterson, Bassam Bamieh, Amr El Abbadi