Sciweavers

PERCOM
2009
ACM
15 years 12 days ago
Practical Rate Adaptation in Mobile Environments
Channel asymmetry and high fluctuation of channel conditions are two salient characteristics of wireless channels in mobile environments. Therefore, when using IEEE 802.11 devices ...
Xi Chen, Prateek Gangwal, Daji Qiao
PERCOM
2009
ACM
15 years 12 days ago
Multi-Event Handlers for Sensor-Driven Ubiquitous Computing Applications
Abstract--We propose an extension to the event-based programming model for sensor-driven ubiquitous computing applications. The extension consists of three abstractions: MultiEvent...
Sean Reilly
PERCOM
2009
ACM
15 years 12 days ago
Human Tracking Using Electric Fields
In this paper we describe a simple, cheap, and unobtrusive demo system that can track multiple persons with low-frequency electric fields. The system's operation is based on m...
Miika Valtonen, Jukka Vanhala
PERCOM
2009
ACM
15 years 12 days ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi
PERCOM
2009
ACM
15 years 12 days ago
A Policy-Based Management Architecture for Mobile Collaborative Teams
Many missions are deemed dangerous or impractical to perform by humans, but can use collaborating, self-managing Unmanned Autonomous Vehicles (UAVs) which adapt their behaviour to ...
Eskindir Asmare, Anandha Gopalan, Morris Sloman, N...
PERCOM
2009
ACM
15 years 12 days ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
PERCOM
2009
ACM
15 years 12 days ago
RFID Based Localization for a Miniaturized Robotic Platform for Wireless Protocols Evaluation
Abstract--The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the deve...
Vikram P. Munishwar, Shailendra Singh 0003, Christ...
PERCOM
2009
ACM
15 years 12 days ago
High Accuracy Context Recovery using Clustering Mechanisms
This paper examines the recovery of user context in indoor environments with existing wireless infrastructures to enable assistive systems. We present a novel approach to the extra...
Dinh Q. Phung, Brett Adams, Kha Tran, Svetha Venka...
PERCOM
2009
ACM
15 years 12 days ago
P2P over MANET: Indirect Tree-based Routing
Abstract--Mobile Ad hoc NETworks (MANET) and Peer-ToPeer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related...
Marcello Caleffi, Luigi Paura