Sciweavers

869 search results - page 166 / 174
» Improved access point selection
Sort
View
SENSYS
2004
ACM
14 years 3 months ago
Mitigating congestion in wireless sensor networks
Network congestion occurs when offered traffic load exceeds available capacity at any point in a network. In wireless sensor networks, congestion causes overall channel quality t...
Bret Hull, Kyle Jamieson, Hari Balakrishnan
DEXA
2004
Springer
108views Database» more  DEXA 2004»
14 years 3 months ago
Towards Context-Aware Data Management for Ambient Intelligence
Ambient Intelligence (AmI) is a vision of future Information Society, where people are surrounded by an electronic environment which is sensitive to their needs, personalized to th...
Ling Feng, Peter M. G. Apers, Willem Jonker
CIVR
2010
Springer
160views Image Analysis» more  CIVR 2010»
14 years 2 months ago
Today's and tomorrow's retrieval practice in the audiovisual archive
Content-based video retrieval is maturing to the point where it can be used in real-world retrieval practices. One such practice is the audiovisual archive, whose users increasing...
Bouke Huurnink, Cees G. M. Snoek, Maarten de Rijke...
HPCA
1998
IEEE
14 years 2 months ago
Address Translation Mechanisms In Network Interfaces
Good network hardware performance is often squandered by overheads for accessing the network interface (NI) within a host. NIs that support user-level messaging avoid frequent ope...
Ioannis Schoinas, Mark D. Hill
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
14 years 1 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine