Sciweavers

107 search results - page 19 / 22
» percom 2006
Sort
View
PERCOM
2006
ACM
15 years 9 months ago
Developing a Model for Trust Management in Pervasive Devices
Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. ...
Andrés Marín López, Daniel Di...
PERCOM
2006
ACM
15 years 9 months ago
Dynamic Peer-To-Peer Overlays for Voice Systems
Different devices, such as mobile phones, soft phones, or desktop phones, have varying processing power, bandwidth, and media capabilities. Heterogeneous P2P voice systems that ar...
Krishna Kishore Dhara, Salman Baset
PERCOM
2006
ACM
15 years 9 months ago
A Simulation-Based Study on the Throughput Capacity of Topology Control in CSMA/CA Networks
Although it is commonly assumed that the use of topology control can improve the throughput capacity of wireless networks, analytical results on this topic are sometimes contradic...
Douglas M. Blough, Cyrus Harvesf, Giovanni Resta, ...
PERCOM
2006
ACM
15 years 9 months ago
Enabling Energy-Efficient and Quality Localization Services
Recent localization research has focused on improving the accuracy of pinpointing the physical location of a target. We think that the energy efficiency and the quality of the loc...
Tsung-Han Lin, Polly Huang, Hao-Hua Chu, Hsing-Hau...
PERCOM
2006
ACM
15 years 9 months ago
Performance Analysis of Stealth DHT with Mobile Nodes
The advances in wireless networking and the consequent emergence of new applications that wireless networks increasingly support inevitably leads to low capability mobile nodes co...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, La...