Sciweavers

MDM
2009
Springer
116views Communications» more  MDM 2009»
14 years 6 months ago
Network Coding Based Data Distribution in WiMAX
—This paper proposes a network coding based data distribution mechanism in WiMAX. Packets are sent by the BS and then a network coded packet is sent for the data reliability. Dif...
Ching-Chun Chou, Hung-Yu Wei
MDM
2009
Springer
269views Communications» more  MDM 2009»
14 years 6 months ago
R-U-In? - Exploiting Rich Presence and Converged Communications for Next-Generation Activity-Oriented Social Networking
—With the growing popularity of social networking, traditional Internet Service Providers (ISPs) and Telecom operators have both started exploring new opportunities to boost thei...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...
MDM
2009
Springer
14 years 6 months ago
A Wireless Human Motion Capturing System for Home Rehabilitation
—Following the trend of miniature intelligent sensing, wearing small, integrated wireless sensor nodes, such as one with accelerometers and compasses, to capture human body motio...
Yu-Chee Tseng, Chin-Hao Wu, Fang-Jing Wu, Chi-Fu H...
MDM
2009
Springer
115views Communications» more  MDM 2009»
14 years 6 months ago
Supporting Contexts for Indoor Navigation Using a Multilayered Space Model
Indoor navigation highly depends on context and requires flexible data structures to support the many use cases and configurations. For example, an indoor navigation system must c...
Thomas Becker, Claus Nagel, Thomas H. Kolbe
MDM
2009
Springer
141views Communications» more  MDM 2009»
14 years 6 months ago
Constructing Hierarchical Representations of Indoor Spaces
Indoor spaces pose many challenges for spatial information systems, amongst them appropriate spatial communication. Compared to typical outdoor spaces, indoor spaces are clustered...
Kai-Florian Richter, Stephan Winter, Urs-Jakob R&u...
MDM
2009
Springer
126views Communications» more  MDM 2009»
14 years 6 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
MACE
2009
Springer
230views Communications» more  MACE 2009»
14 years 6 months ago
Combining Learned and Highly-Reactive Management
Learned models of behavior have the disadvantage that they must be retrained after any change in system configuration. Autonomic management methods based upon learned models lose ...
Alva L. Couch, Marc Chiarini
MACE
2009
Springer
278views Communications» more  MACE 2009»
14 years 6 months ago
Achieving High-Level Directives Using Strategy-Trees
Abstract. A strategy-tree provides a systematic approach to the evaluation of the effectiveness of deployed policy sets and a mechanism to dynamically alter policy sets (i.e., alt...
Bradley Simmons, Hanan Lutfiyya
IFIP
2009
Springer
14 years 6 months ago
A Pipelined IP Address Lookup Module for 100 Gbps Line Rates and beyond
New Internet services and technologies call for higher packet switching capacities in the core network. Thus, a performance bottleneck arises at the backbone routers, as forwarding...
Domenic Teuchert, Simon Hauger
IFIP
2009
Springer
14 years 6 months ago
Network Awareness in P2P-TV Applications
The increasing popularity of applications for video-streaming based on P2P paradigm (P2P-TV) is raising the interest of both broadcasters and network operators. The former see a pr...
Stefano Traverso, Emilio Leonardi, Marco Mellia, M...