Sciweavers

2028 search results - page 294 / 406
» Deriving Relation Keys from XML Keys
Sort
View
GLOBECOM
2009
IEEE
15 years 11 months ago
The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can
—802.11 localization algorithms provide the ability to accurately position and track wireless clients thereby enabling location-based services and applications. However, we show ...
Kevin S. Bauer, Damon McCoy, Eric W. Anderson, Mar...
ADHOCNETS
2009
Springer
15 years 11 months ago
QoS over Real-Time Wireless Multi-hop Protocol
Abstract. This paper proposes a way to incorporate multimedia traffic in a real-time wireless communication network without jeopardizing the hard real-time traffic. This idea has ...
Domenico Sicignano, Danilo Tardioli, José L...
WEBDB
2009
Springer
130views Database» more  WEBDB 2009»
15 years 11 months ago
A Referential Integrity Browser for Distributed Databases
We demonstrate a program that can inspect a distributed relational database on the Internet to discover and quantify referential integrity issues for integration purposes. The pro...
Carlos Ordonez, Javier García-García...
AGILE
2009
Springer
253views GIS» more  AGILE 2009»
15 years 11 months ago
Identification of Practically Visible Spatial Objects in Natural Environments
Image retrieval of landscape photographs requires accurate annotation using multi-faceted descriptions relating to the subject and content of the photograph. The subject of such ph...
Martin Tomko, Friedjoff Trautwein, Ross S. Purves
CISS
2008
IEEE
15 years 11 months ago
Optimal rate control policies for proportional fairness in wireless networks
— In this paper we consider a K transmitter and K receiver single-hop wireless network. We obtain a rate control policy that provides proportional fair rate allocation to the tra...
Anna Pantelidou, Anthony Ephremides