Sciweavers

2032 search results - page 315 / 407
» Application Development in Vision-Enabled Wireless Sensor Ne...
Sort
View
117
Voted
PERCOM
2003
ACM
16 years 2 months ago
Smart Identification Frameworks for Ubiquitous Computing Applications
Abstract. We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe su...
Friedemann Mattern, Kay Römer, Thomas Dü...
126
Voted
PAAMS
2010
Springer
15 years 6 months ago
Mobile Agents in Vehicular Networks: Taking a First Ride
A vehicular ad hoc network (VANET) is a type of mobile network whose nodes are traveling cars which communicate with one another using short-range wireless communications. These ca...
Oscar Urra, Sergio Ilarri, Thierry Delot, Eduardo ...
161
Voted
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 28 days ago
A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks
The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques that plays influential role in ensuring the desired Quality of Service (QoS) to the users...
H. S. Ramesh Babu, Gowrishankar, P. S. Satyanaraya...
100
Voted
VTC
2006
IEEE
110views Communications» more  VTC 2006»
15 years 8 months ago
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
— WLANs will become a major portion of the fourth generation (4G) cellular system. The seamless handoff problem in WLANs is a very important design issue to support the new astou...
Yuh-Shyan Chen, Chung-Kai Chen, Ming-Chin Chuang
PERCOM
2007
ACM
16 years 2 months ago
Towards an Open Source Toolkit for Ubiquitous Device Authentication
Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless communication. Due ...
Rene Mayrhofer