Sciweavers

6348 search results - page 1169 / 1270
» A Lesson for Software Engineering from Knowledge Engineering
Sort
View
ISORC
2008
IEEE
14 years 2 months ago
Hardware Objects for Java
Java, as a safe and platform independent language, avoids access to low-level I/O devices or direct memory access. In standard Java, low-level I/O it not a concern; it is handled ...
Martin Schoeberl, Christian Thalinger, Stephan Kor...
COMSWARE
2007
IEEE
14 years 2 months ago
Integrated Data Location in Multihop Wireless Networks
Abstract— Multihop wireless networks are ideal as infrastructures for location-aware network applications, particularly for disaster recovery operations. However, one missing com...
Irfan Sheriff, Prashanth Aravinda Kumar Acharya, A...
COMSWARE
2007
IEEE
14 years 2 months ago
ExPLoIT: Exploiting Past Location Information and Transitivity for positioning in mobile sensor networks
— We present a novel distributed range-free technique called ExPLoIT for estimating geographical location of sensor nodes in mobile sensor networks. ExPLoIT is the rst positioning...
Christophe Baraer, Kaustubh S. Phanse, Johan Nykvi...
COMSWARE
2007
IEEE
14 years 2 months ago
Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks
—Clustering techniques create hierarchal network structures, called clusters, on an otherwise flat network. Neighboring devices elect one appropriate device as clusterhead. Due t...
Matthias R. Brust, Adrian Andronache, Steffen Roth...
COMSWARE
2007
IEEE
14 years 2 months ago
Distributed Fault-Tolerant Topology Control in Static and Mobile Wireless Sensor Networks
— In wireless sensor networks, minimizing power consumption and at the same time maintaining desired properties in the network topology is of prime importance. In this work, we p...
Indranil Saha, Lokesh Kumar Sambasivan, Ranjeet Ku...
« Prev « First page 1169 / 1270 Last » Next »