Sciweavers

429 search results - page 65 / 86
» Group Routing without Group Routing Tables
Sort
View
NDSS
2002
IEEE
14 years 1 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
CSEE
2007
Springer
13 years 10 months ago
Maintaining High Process Capability in a Student Project Course
We have provided a focus on process management and improvement as a basis for conducting student group projects. This paper summarises the lessons learnt from eight years of exper...
Terence P. Rout, John Seagrott
IE
2007
13 years 10 months ago
Exploring terra incognita: wayfinding devices for games
The ludic experience of exploring wilderness in gameworlds may be compromised by either the negative affects of disorientation or the conspicuous application of architectural prin...
Nicola J. Bidwell, Colin Lemmon, Mihai Roturu, Chr...
IJSNET
2008
114views more  IJSNET 2008»
13 years 8 months ago
PERT: a new power-efficient real-time packet delivery scheme for sensor networks
Abstract: We present PERT, a power-efficient scheme to deliver real-time data packets in sensor networks. Time-sensitive sensor data is common in applications such as hazard monito...
Shanzhong Zhu, Wei Wang, Chinya V. Ravishankar
TWC
2008
153views more  TWC 2008»
13 years 8 months ago
Improved Resource Management through User Aggregation in Heterogeneous Multiple Access Wireless Networks
Abstract--In this letter we discuss the exploitation of aggregated mobility patterns in mobile networks including heterogeneous multiple access techniques. We advocate the use of k...
Leonardo Badia, Nicola Bui, Marco Miozzo, Michele ...