Sciweavers

1610 search results - page 290 / 322
» A Transaction Model for Mobile Computing
Sort
View
TSMC
2010
13 years 3 months ago
Cellular Learning Automata With Multiple Learning Automata in Each Cell and Its Applications
The cellular learning automaton (CLA), which is a4 combination of cellular automaton (CA) and learning automaton5 (LA), is introduced recently. This model is superior to CA because...
Hamid Beigy, Mohammad Reza Meybodi
MOBIHOC
2004
ACM
14 years 8 months ago
Internal synchronization of drift-constraint clocks in ad-hoc sensor networks
Clock synchronization is a crucial basic service in typical sensor networks, since the observations of distributed sensors more often than not need to be ordered ("a happened...
Lennart Meier, Philipp Blum, Lothar Thiele
CHI
2009
ACM
14 years 9 months ago
A personalized walk through the museum: the CHIP interactive tour guide
More and more museums aim at enhancing their visitors' museum experiences in a personalized, intensive and engaging way inside the museum. The CHIP1 (Cultural Heritage Inform...
Ivo Roes, Natalia Stash, Yiwen Wang, Lora Aroyo
VLDB
2006
ACM
171views Database» more  VLDB 2006»
14 years 9 months ago
Grid-partition index: a hybrid method for nearest-neighbor queries in wireless location-based services
Abstract Traditional nearest-neighbor (NN) search is based on two basic indexing approaches: object-based indexing and solution-based indexing. The former is constructed based on t...
Baihua Zheng, Jianliang Xu, Wang-Chien Lee, Dik Lu...
SERSCISA
2009
Springer
14 years 3 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim