Sciweavers

2347 search results - page 200 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
WCNC
2008
IEEE
14 years 2 months ago
Interference in a Cognitive Network with Beacon
—We study a cognitive network consisting of multiple cognitive users communicating in the presence of a single primary user. The primary user is located at the center of the netw...
Mai Vu, Saeed S. Ghassemzadeh, Vahid Tarokh
ICC
2007
IEEE
151views Communications» more  ICC 2007»
14 years 2 months ago
Local Update-Based Routing Protocol in Wireless Sensor Networks with Mobile Sinks
- Mobile sinks can be a viable solution to solve the problem that energy consumption is not balanced for all the sensor nodes in Wireless Sensor Networks (WSNs). Frequent location ...
Guojun Wang, Tian Wang, Weijia Jia, Minyi Guo, Hsi...
DEXA
2007
Springer
173views Database» more  DEXA 2007»
14 years 2 months ago
A P2P Technique for Continuous k-Nearest-Neighbor Query in Road Networks
Due to the high frequency in location updates and the expensive cost of continuous query processing, server computation capacity and wireless communication bandwidth are the two li...
Fuyu Liu, Kien A. Hua, Tai T. Do
ICPADS
2006
IEEE
14 years 2 months ago
Optimal Placement of Replicas in Data Grid Environments with Locality Assurance
Data replications is a typical strategy for increasing access performance and data availability in Data Grid systems. Current work on data replication in Grid systems focuses on i...
Yi-Fang Lin, Pangfeng Liu, Jan-Jan Wu
IWCMC
2006
ACM
14 years 2 months ago
Tracers placement for IP traceback against DDoS attacks
This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attac...
Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-M...