Sciweavers

2169 search results - page 371 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
MOBICOM
2004
ACM
14 years 2 months ago
Modeling mobility for vehicular ad-hoc networks
Without realistic modeling of node mobility, simulation evaluation of performance of mobile ad hoc networks may not correlate well with performance in a real deployment. In this p...
Amit Kumar Saha, David B. Johnson
ALGOSENSORS
2004
Springer
14 years 2 months ago
WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks
WiseMAC is a medium access control protocol designed for wireless sensor networks. This protocol is based on non-persistent CSMA and uses the preamble sampling technique to minimiz...
Amre El-Hoiydi, Jean-Dominique Decotignie
MCS
2001
Springer
14 years 1 months ago
Finding Consistent Clusters in Data Partitions
Abstract. Given an arbitrary data set, to which no particular parametrical, statistical or geometrical structure can be assumed, different clustering algorithms will in general pr...
Ana L. N. Fred
UML
2001
Springer
14 years 1 months ago
On Querying UML Data Models with OCL
UML is the de-facto standard language for Object-Oriented analysis and design of information systems. Persistent storage and extraction of data in such systems is supported by dat...
David H. Akehurst, Behzad Bordbar
ACMDIS
2000
ACM
14 years 1 months ago
Rapid Ethnography: Time Deepening Strategies for HCI Field Research
Field research methods are useful in the many aspects of HumanComputer Interaction research, including gathering user requirements, understanding and developing user models, and n...
David R. Millen