Sciweavers

822 search results - page 134 / 165
» Wireless course management system
Sort
View
MDM
2010
Springer
194views Communications» more  MDM 2010»
13 years 12 months ago
Timing and Radius Considerations for Maintaining Connectivity QoS
—Given the potential scale on which a Wireless Sensor Network (WSN) can be deployed, multi-hop communication will be a pivotal component of the system. When redundant nodes are d...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...
TWC
2008
176views more  TWC 2008»
13 years 9 months ago
Asynchronous distributed power and rate control in ad hoc networks: a game-theoretic approach
This paper analyzes distributed asynchronous power and rate control for wireless ad hoc networks. Importantly, all network transmitters are considered to be independent of any mana...
Stepán Kucera, Sonia Aïssa, Koji Yamam...
PERCOM
2007
ACM
14 years 9 months ago
Challenges for Pervasive RFID-Based Infrastructures
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deploym...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
PERCOM
2006
ACM
14 years 9 months ago
Reducing Configuration Overhead with Goal-oriented Programming
The rapid increase in the number and variety of consumer-level electronic devices without the corresponding development of device management technology has lead to a configuration ...
Justin Mazzola Paluska, Hubert Pham, Umar Saif, Ch...
SECURWARE
2008
IEEE
14 years 4 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...