Sciweavers

6320 search results - page 1012 / 1264
» Towards Situated Computing
Sort
View
150
Voted
PERCOM
2007
ACM
16 years 4 months ago
Analytical modeling and mitigation techniques for the energy hole problem in sensor networks
In this paper we investigate the problem of uneven energy consumptions in a large class of many-to-one sensor networks. In a many-to-one sensor network, all sensor nodes generate ...
Jian Li, Prasant Mohapatra
PERCOM
2007
ACM
16 years 4 months ago
A State-Based Programming Model and System for Wireless Sensor Networks
Sensor networks are one important building block towards the realisation of context-aware applications. Suitable communication protocols and middleware solutions are necessary to ...
Urs Bischoff, Gerd Kortuem
185
Voted
PERCOM
2006
ACM
16 years 4 months ago
Dynamic Peer-To-Peer Overlays for Voice Systems
Different devices, such as mobile phones, soft phones, or desktop phones, have varying processing power, bandwidth, and media capabilities. Heterogeneous P2P voice systems that ar...
Krishna Kishore Dhara, Salman Baset
167
Voted
PERCOM
2005
ACM
16 years 4 months ago
REDMAN: A Decentralized Middleware Solution for Cooperative Replication in Dense MANETs
The mass market of wireless devices is pushing towards service provisioning over dense Mobile Ad-hoc NETworks (MANETs), i.e., limited spatial regions, such as university campuses,...
Paolo Bellavista, Antonio Corradi, Eugenio Magistr...
143
Voted
PERCOM
2005
ACM
16 years 4 months ago
When Does Opportunistic Routing Make Sense?
Different opportunistic routing protocols have been proposed recently for routing in sensor networks. These protocols exploit the redundancy among nodes by using a node that is av...
Adam Wolisz, Jan M. Rabaey, Rahul C. Shah, Sven Wi...
« Prev « First page 1012 / 1264 Last » Next »