Sciweavers

683 search results - page 111 / 137
» Exploiting Logical Mobility in Mobile Computing Middleware
Sort
View
CJ
2004
105views more  CJ 2004»
13 years 9 months ago
Generalized Template Splay: A Basic Theory and Calculus
act interpretation. R. Barbuti, C. Bernardeschi and N. De Francesco With mobile technology more and more prominent, the problem of security leakages becomes more and more important...
George F. Georgakopoulos, David J. McClurkin
ICRA
2010
IEEE
132views Robotics» more  ICRA 2010»
13 years 8 months ago
Sampling-based motion planning with temporal goals
Abstract— This paper presents a geometry-based, multilayered synergistic approach to solve motion planning problems for mobile robots involving temporal goals. The temporal goals...
Amit Bhatia, Lydia E. Kavraki, Moshe Y. Vardi
MONET
2002
162views more  MONET 2002»
13 years 9 months ago
AMRoute: Ad Hoc Multicast Routing Protocol
The Ad hoc Multicast Routing protocol (AMRoute) presents a novel approach for robust IP Multicast in mobile ad hoc networks by exploiting user-multicast trees and dynamic logical c...
Jason Xie, Rajesh R. Talpade, Anthony McAuley, Min...
PERCOM
2009
ACM
14 years 10 months ago
P2P over MANET: Indirect Tree-based Routing
Abstract--Mobile Ad hoc NETworks (MANET) and Peer-ToPeer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related...
Marcello Caleffi, Luigi Paura
IWCMC
2006
ACM
14 years 3 months ago
A simulation study of a MAC layer protocol for wireless networks with asymmetric links
— Asymmetric links are common in wireless networks for a variety of physical, logical, operational, and legal considerations. An asymmetric link supports uni-directional communic...
Guoqiang Wang, Damla Turgut, Ladislau Böl&oum...