Sciweavers

950 search results - page 119 / 190
» presence 2008
Sort
View
ICC
2008
IEEE
162views Communications» more  ICC 2008»
15 years 4 months ago
Distributed Opportunistic Scheduling in Multihop Wireless Ad Hoc Networks
Abstract—In this paper, we introduce a framework for distributed opportunistic scheduling in multihop wireless ad hoc networks. With the proposed framework, one can take a schedu...
Yijiang Sun, Victor O. K. Li, Ka-Cheong Leung
ECSA
2008
Springer
14 years 11 months ago
Non-synchronous Communications in Process Algebraic Architectural Description Languages
Abstract. Architectural description languages are a useful tool for modmplex software systems at a high level of abstraction and, if based on formal methods, for enabling the early...
Marco Bernardo, Edoardo Bontà
GLOBECOM
2008
IEEE
14 years 10 months ago
Robust Edge Detection in Wireless Sensor Networks
Abstract— The ability to geometrically represent sensed phenomena within a wireless sensor network can provide a more concise view than enumeration of all nodes identifying a phe...
Christopher J. Mallery, Muralidhar Medidi
HICSS
2008
IEEE
96views Biometrics» more  HICSS 2008»
15 years 4 months ago
Towards a Framework for Evaluating Immersive Business Models: Evaluating Service Innovations in Second Life
Virtual worlds may be enabling technologies for the next generation of business models, practices and innovations in service. We situate our research within the field of service s...
Henry M. Kim, Kelly A. Lyons, Mary Ann Cunningham
LCN
2008
IEEE
15 years 4 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong