Sciweavers

1030 search results - page 131 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
135
Voted
ICDCSW
2007
IEEE
15 years 10 months ago
Object-Swapping for Resource-Constrained Devices
Mobile devices are still memory-constrained when compared to desktop and laptop computers. Thus, in some circumstances, even while occupied by useful objects, some memory must be ...
Luís Veiga, Paulo Ferreira
DCOSS
2006
Springer
15 years 7 months ago
Agimone: Middleware Support for Seamless Integration of Sensor and IP Networks
The scope of wireless sensor network (WSN) applications has traditionally been restricted by physical sensor coverage and limited computational power. Meanwhile, IP networks like t...
Gregory Hackmann, Chien-Liang Fok, Gruia-Catalin R...
144
Voted
CORR
2011
Springer
170views Education» more  CORR 2011»
14 years 11 months ago
Performance Comparison and Analysis of Preemptive-DSR and TORA
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. Preemptiv...
V. Ramesh, P. Subbaiah, N. Koteswar Rao, N. Subhas...
MOBIHOC
2008
ACM
16 years 3 months ago
Routing in a cyclic mobispace
A key challenge of routing in delay tolerant networks (DTNs) is to find routes that have high delivery rates and low endto-end delays. When oracles are not available for future co...
Cong Liu, Jie Wu
141
Voted
WONS
2005
IEEE
15 years 9 months ago
Co-operative Downloading in Vehicular Ad-Hoc Wireless Networks
Increasing need for people to be “connected”; while at the same time remain as mobile as ever poses several interesting issues in wireless networks. It is conceivable in the n...
Alok Nandan, Shirshanka Das, Giovanni Pau, Mario G...