Sciweavers

1017 search results - page 190 / 204
» On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
Sort
View
VTC
2006
IEEE
199views Communications» more  VTC 2006»
14 years 2 months ago
Comparison of User Mobility Pattern Prediction Algorithms to increase Handover Trigger Accuracy
— The estimation of correct triggers for handover in cellular networks belongs to the critical tasks for accurate network operation. The importance of seamless handover even rise...
Stefan Michaelis, Christian Wietfeld
CDC
2008
IEEE
161views Control Systems» more  CDC 2008»
14 years 2 months ago
Distributed policies for equitable partitioning: Theory and applications
Abstract— The most widely applied resource allocation strategy is to balance, or equalize, the total workload assigned to each resource. In mobile multi-agent systems, this princ...
Marco Pavone, Emilio Frazzoli, Francesco Bullo
LCTRTS
2005
Springer
14 years 1 months ago
Efficient application migration under compiler guidance
Mobile computing based upon wireless technology as the interconnect and PDAs, Web-enabled cell phones etc. as the end devices provide a rich infrastructure for anywhere, anytime i...
Kun Zhang, Santosh Pande
PPOPP
2003
ACM
14 years 1 months ago
Impala: a middleware system for managing autonomic, parallel sensor systems
Sensor networks are long-running computer systems with many sensing/compute nodes working to gather information about their environment, process and fuse that information, and in ...
Ting Liu, Margaret Martonosi
DAC
2006
ACM
14 years 9 months ago
SMERT: energy-efficient design of a multimedia messaging system for mobile devices
Customized multimedia content delivery has become one of the most desirable applications to mobile device users. However its intense usage of wireless and user interfaces poses a ...
Lin Zhong, Bin Wei, Michael J. Sinclair