Sciweavers

814 search results - page 138 / 163
» Solutions to Hidden Terminal Problems in Wireless Networks
Sort
View
SIAMAM
2011
12 years 11 months ago
On the Optimal Receiver Activation Function for Distance-Based Geographic Transmissions
In wireless networks, the channels are often subject to random variations that limit the reliability of communications between any two radios. Geographic transmission strategies ca...
Murali Rao, Tathagata D. Goswami, Joseph Glover, J...
TMC
2008
192views more  TMC 2008»
13 years 8 months ago
A Bidding Algorithm for Optimized Utility-Based Resource Allocation in Ad Hoc Networks
Abstract-- This article proposes a scheme for bandwidth allocation in wireless ad hoc networks. The quality of service (QoS) levels for each end-to-end flow are expressed using a r...
Calin Curescu, Simin Nadjm-Tehrani
PERCOM
2005
ACM
14 years 8 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
MOBIDE
1999
ACM
14 years 23 days ago
Pervasive Computing: What is it Good for?
The first mass-produced pervasive computing devices are starting to appear—the AutoPC, the Internet-connected ScreenFridge, and the combination Microwave Oven/Home Banking term...
Andrew C. Huang, Benjamin C. Ling, Shankar Ponneka...
ICC
2008
IEEE
139views Communications» more  ICC 2008»
14 years 2 months ago
Evaluation of RSVP and Mobility-Aware RSVP Using Performance Evaluation Process Algebra
—As a resource reservation mechanism, the Resource ReSerVation Protocol (RSVP) faces a lot of challenges when applying it to the wireless and mobile networks. The interworking pr...
Hao Wang, David I. Laurenson, Jane Hillston