Sciweavers

1172 search results - page 152 / 235
» MIPv6 experimental evaluation using overlay networks
Sort
View
WWW
2008
ACM
14 years 11 months ago
Asymmetrical query recommendation method based on bipartite network resource allocation
This paper presents a new query recommendation method that generates recommended query list by mining large-scale user logs. Starting from the user logs of click-through data, we ...
Zhiyuan Liu, Maosong Sun
EWSN
2007
Springer
14 years 10 months ago
Approximate Initialization of Camera Sensor Networks
Camera sensor networks--wireless networks of low-power imaging sensors--have become popular recently for monitoring applications. In this paper, we argue that traditional vision-ba...
Purushottam Kulkarni, Prashant J. Shenoy, Deepak G...
EWSN
2010
Springer
14 years 7 months ago
F-LQE: A Fuzzy Link Quality Estimator for Wireless Sensor Networks
Abstract. Radio Link Quality Estimation (LQE) is a fundamental building block for Wireless Sensor Networks, namely for a reliable deployment, resource management and routing. Exist...
Nouha Baccour, Anis Koubaa, Habib Youssef, Maissa ...
ICDCSW
2009
IEEE
14 years 5 months ago
EDLA Tradeoffs for Wireless Sensor Network Target Tracking
—The number of active nodes in a WSN deployment governs both the longevity of the network and the accuracy of applications using the network’s data. As node hibernation techniq...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
14 years 4 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar