Sciweavers

675 search results - page 128 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
BTW
2007
Springer
189views Database» more  BTW 2007»
14 years 1 months ago
Reconsidering Consistency Management in Shared Data Spaces for Emergency and Rescue Applications
: Efficient information sharing is very important for emergency and rescue operations. These operations often have to be performed in environments where no communication infrastruc...
Thomas Plagemann, Ellen Munthe-Kaas, Vera Goebel
ALGOSENSORS
2004
Springer
14 years 23 days ago
On a Conjecture Related to Geometric Routing
We conjecture that any planar 3-connected graph can be embedded in the plane in such a way that for any nodes s and t, there is a path from s to t such that the Euclidean distance ...
Christos H. Papadimitriou, David Ratajczak
INFOCOM
2007
IEEE
14 years 1 months ago
Face Tracing Based Geographic Routing in Nonplanar Wireless Networks
— Scalable and efficient routing is a main challenge in the deployment of large ad hoc wireless networks. An essential element of practical routing protocols is their accommodat...
Fenghui Zhang, Hao Li, Anxiao Jiang, Jianer Chen, ...
22
Voted
ICDM
2006
IEEE
116views Data Mining» more  ICDM 2006»
14 years 1 months ago
Entity Resolution with Markov Logic
Entity resolution is the problem of determining which records in a database refer to the same entities, and is a crucial and expensive step in the data mining process. Interest in...
Parag Singla, Pedro Domingos
ISORC
2000
IEEE
13 years 11 months ago
Deadline Handling in Real-Time Distributed Objects
: Deadline handling is a fundamental part of real-time computing but has been practiced in ad hoc forms for decades. A general framework for systematic deadline handling in real-ti...
K. H. Kim, Juqiang Liu, Moon-hae Kim