Sciweavers

771 search results - page 80 / 155
» Wireless Network Information Flow: A Deterministic Approach
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
IJIIDS
2008
46views more  IJIIDS 2008»
13 years 9 months ago
Modelling an emergency vehicle early-warning system using real-time feedback
: Emergency vehicles, while usually equipped with warning sirens and/or beacons, are still often impeded by other traffic and involved in numerous collisions. An effective warning ...
Aline Senart, Mélanie Bouroche, Vinny Cahil...
SENSYS
2006
ACM
14 years 3 months ago
RBP: robust broadcast propagation in wireless networks
Varying interference levels make broadcasting an unreliable operation in low-power wireless networks. Many routing and resource discovery protocols depend on flooding (repeated pe...
Fred Stann, John S. Heidemann, Rajesh Shroff, Muha...
IMCSIT
2010
13 years 7 months ago
Efficient Coloring of Wireless Ad Hoc Networks With Diminished Transmitter Power
In our work we present a new approach to the problem of channel assignment in Wireless Ad Hoc Network. We introduce a new algorithm which works in distributed model of computations...
Krzysztof Krzywdzinski
WOWMOM
2009
ACM
204views Multimedia» more  WOWMOM 2009»
14 years 1 months ago
ECTC: Energy effiCient topology control algorithm for wireless sensor networks
Sensor network which operates on battery are used to gather data in a variety of environments. The data collected by each node is communicated through the network to the sink, whi...
Nedal Ababneh, Anastasios Viglas, Houda Labiod, Na...