Sciweavers

771 search results - page 80 / 155
» Wireless Network Information Flow: A Deterministic Approach
Sort
View
PERCOM
2005
ACM
15 years 10 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
IJIIDS
2008
46views more  IJIIDS 2008»
14 years 11 months ago
Modelling an emergency vehicle early-warning system using real-time feedback
: Emergency vehicles, while usually equipped with warning sirens and/or beacons, are still often impeded by other traffic and involved in numerous collisions. An effective warning ...
Aline Senart, Mélanie Bouroche, Vinny Cahil...
SENSYS
2006
ACM
15 years 5 months ago
RBP: robust broadcast propagation in wireless networks
Varying interference levels make broadcasting an unreliable operation in low-power wireless networks. Many routing and resource discovery protocols depend on flooding (repeated pe...
Fred Stann, John S. Heidemann, Rajesh Shroff, Muha...
IMCSIT
2010
14 years 9 months ago
Efficient Coloring of Wireless Ad Hoc Networks With Diminished Transmitter Power
In our work we present a new approach to the problem of channel assignment in Wireless Ad Hoc Network. We introduce a new algorithm which works in distributed model of computations...
Krzysztof Krzywdzinski
WOWMOM
2009
ACM
204views Multimedia» more  WOWMOM 2009»
15 years 3 months ago
ECTC: Energy effiCient topology control algorithm for wireless sensor networks
Sensor network which operates on battery are used to gather data in a variety of environments. The data collected by each node is communicated through the network to the sink, whi...
Nedal Ababneh, Anastasios Viglas, Houda Labiod, Na...