Sciweavers

10995 search results - page 2102 / 2199
» Positioning
Sort
View
JCP
2006
151views more  JCP 2006»
13 years 9 months ago
Simulated Annealing based Wireless Sensor Network Localization
In this paper, we describe a novel localization algorithm for ad hoc wireless sensor networks. Accurate selforganization and localization capability is a highly desirable character...
Anushiya A. Kannan, Guoqiang Mao, Branka Vucetic
JSS
2008
86views more  JSS 2008»
13 years 9 months ago
Understanding knowledge sharing activities in free/open source software projects: An empirical study
Free/Open Source Software (F/OSS) projects are people-oriented and knowledge intensive software development environments. Many researchers focused on mailing lists to study coding...
Sulayman K. Sowe, Ioannis Stamelos, Lefteris Angel...
JSW
2008
196views more  JSW 2008»
13 years 9 months ago
Providing Data Items with Time Constraints in Multi-Channel Broadcasting Environments
In a mobile computing system, users carrying portable devices can access database services from any location without requiring a fixed position in the networking environment. Some ...
Ding-Jung Chiang, Hwei-Jen Lin, Timothy K. Shih
JSYML
2008
95views more  JSYML 2008»
13 years 9 months ago
Examples of non-locality
free but not Whitehead Abelian groups to construct Abstract Elementary Classes (AEC) which satisfy the amalgamation property but fail various conditions on the locality of Galois-...
John T. Baldwin, Saharon Shelah
JUCS
2008
113views more  JUCS 2008»
13 years 9 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
« Prev « First page 2102 / 2199 Last » Next »