Sciweavers

1150 search results - page 108 / 230
» Beacon Based Authentication
Sort
View
MOBIWAC
2006
ACM
14 years 2 months ago
Quick convergecast in ZigBee/IEEE 802.15.4 tree-based wireless sensor networks
Convergecast is a fundamental operation in wireless sensor networks. Existing convergecast solutions have focused on reducing latency and energy consumption. However, a good desig...
Yu-Chee Tseng, Meng-Shiuan Pan
EUC
2005
Springer
14 years 2 months ago
PULSE: A MAC Protocol for RFID Networks
1 The reader collision problem occurs when the signal from one reader interferes with the signal from other readers. Solutions like RTS-CTS are not applicable because a reader may ...
Shailesh M. Birari, Sridhar Iyer
ICRA
1994
IEEE
96views Robotics» more  ICRA 1994»
14 years 1 months ago
The CLAPPER: A Dual-Drive Mobile Robot with Internal Correction of Dead-Reckoning Errors
This paper presents a new approach to accurate and reliable dead-reckoning with mobile robots. The approach makes use of special properties of our recently developed Multi-Degreeo...
Johann Borenstein
CN
2004
99views more  CN 2004»
13 years 8 months ago
Efficient peer location on the Internet
We consider the problem of locating nearby application peers over the Internet. We define a new peer-location scheme (called Tiers), that scales to large application peer groups. ...
Suman Banerjee, Christopher Kommareddy, Bobby Bhat...
ICC
2009
IEEE
127views Communications» more  ICC 2009»
13 years 6 months ago
Starburst SSD: An Efficient Protocol for Selective Dissemination
Abstract--We present Starburst, a routing-based protocol designed to efficiently disseminate data items to small subsets within a sensor network. Starburst constructs a routing hie...
Tahir Azim, Qasim Mansoor, Philip Levis