Sciweavers

13007 search results - page 2551 / 2602
» Wireless and Mobile Networking
Sort
View
AUTOMATICA
2006
140views more  AUTOMATICA 2006»
13 years 9 months ago
On a stochastic sensor selection algorithm with applications in sensor scheduling and sensor coverage
In this note we consider the following problem. Suppose a set of sensors is jointly trying to estimate a process. One sensor takes a measurement at every time step and the measure...
Vijay Gupta, Timothy H. Chung, Babak Hassibi, Rich...
CN
2006
161views more  CN 2006»
13 years 9 months ago
A multimedia traffic modeling framework for simulation-based performance evaluation studies
The emergence of high-speed communication systems has enabled the support of complex multimedia applications. The traffic patterns generated by such applications are likely to be ...
Assen Golaup, Hamid Aghvami
CN
2006
78views more  CN 2006»
13 years 9 months ago
CNPGSDP: An efficient group-based service discovery protocol for MANETs
The ability to discover services is the major prerequisite for effective usability of MANETs. Group-based Service Discovery (GSD) protocol is a typical service discovery protocol ...
Zhen-guo Gao, Ling Wang, Mei Yang, Xiaozong Yang
COMCOM
2007
115views more  COMCOM 2007»
13 years 8 months ago
New bluetooth interconnection methods: Overlaid Bluetooth Piconets (OBP) and Temporary Scatternets (TS)
In a large scale Bluetooth network, the permanent Scatternet is regarded as the only method to interconnect Piconets. But, many Bluetooth devices do not support Scatternet. When t...
Sewook Jung, Alexander Chang, Mario Gerla
IJNSEC
2006
89views more  IJNSEC 2006»
13 years 8 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara
« Prev « First page 2551 / 2602 Last » Next »