Sciweavers

1259 search results - page 245 / 252
» Analysis of Movement and Mobility of Wireless Network Users
Sort
View
PETRA
2009
ACM
14 years 4 months ago
Carbon nanotube coated high-throughput neurointerfaces in assistive environments
Loosing motor activity due to impaired or damaged nerves or muscles affects millions of people world-wide. The resulting lack of mobility and/or impaired communication bears enorm...
Mario I. Romero-Ortega, Ali Raza Butt, Samir M. Iq...
SOCIALCOM
2010
13 years 7 months ago
GDC: Group Discovery Using Co-location Traces
Smart phones can collect and share Bluetooth co-location traces to identify ad hoc or semi-permanent social groups. This information, known to group members but otherwise unavailab...
Steve Mardenfeld, Daniel Boston, Susan Juan Pan, Q...
MOBICOM
2006
ACM
14 years 3 months ago
Fast and reliable estimation schemes in RFID systems
RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with t...
Murali S. Kodialam, Thyaga Nandagopal
ISCC
2005
IEEE
146views Communications» more  ISCC 2005»
14 years 3 months ago
A Credit-Based On-Demand QoS Routing Protocol over Bluetooth WPANs
The quality-of-service (QoS) communication that supports mobile applications to guarantee bandwidth utilization is an important issue for Bluetooth wireless personal area networks...
Yuh-Shyan Chen, Keng-Shau Liu, Yun-Wei Lin
JPDC
2007
112views more  JPDC 2007»
13 years 9 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao