Sciweavers

1030 search results - page 125 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
156
Voted
KDD
2008
ACM
217views Data Mining» more  KDD 2008»
16 years 4 months ago
Stream prediction using a generative model based on frequent episodes in event sequences
This paper presents a new algorithm for sequence prediction over long categorical event streams. The input to the algorithm is a set of target event types whose occurrences we wis...
Srivatsan Laxman, Vikram Tankasali, Ryen W. White
114
Voted
ICDCSW
2008
IEEE
15 years 10 months ago
Mobility Control for Complete Coverage in Wireless Sensor Networks
In this paper, we propose a new control method to cover the “holes” in wireless sensor networks. Many applications often face the problem of holes when some sensor nodes are d...
Zhen Jiang, Jie Wu, Robert Kline, Jennifer Krantz
TNC
2004
140views Education» more  TNC 2004»
15 years 5 months ago
Seamless Multimedia Communications in Heterogeneous Mobile Access Networks
With the advent of the new wireless technologies allowing for higher data rates, the provision of high quality multimedia services over the upcoming wireless and mobile networks i...
Pedro M. Ruiz, Juan A. Botía, Antonio F. G&...
ATAL
2010
Springer
15 years 5 months ago
UAV swarm coordination using cooperative control for establishing a wireless communications backbone
In this paper, we present a mechanism to fly a swarm of UAVs with the aim of establishing a wireless backbone over a pre-specified area. The backbone is aimed at connecting interm...
Achudhan Sivakumar, Colin Keng-Yan Tan
138
Voted
ADHOCNOW
2009
Springer
15 years 10 months ago
SenSearch: GPS and Witness Assisted Tracking for Delay Tolerant Sensor Networks
Abstract— Mobile wireless sensor networks have to be robust against the limitations of the underlying platform. While lightweight form factor makes them an attractive choice for ...
Lun Jiang, Jyh-How Huang, Ankur Kamthe, Tao Liu, I...