|
|
|
|
Lin, HY
Dept. of Management Information System, China University of Technology, Taiwan, R.O.C.
Taipei, Taiwan
|
|
|
|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 19
reviews
|
|
|
|
|
|
|
|
A stochastic process model of the hop count distribution in wireless sensor networks Beyme S., Leung C. Ad Hoc Networks 1760-70, 2014. Type: Article
In general, this is an appropriate paper with fine structures, methodologies, analyses, and detailed simulation on a proposed stochastic process model for the hop count distribution in wireless sensor networks (WSNs). The authors give ...
|
Jan 22 2015 |
|
|
|
|
|
|
An energy efficient middleware for an ad-hoc AAL wireless sensor network Fernandez-Luque F., PéRez D., MartíNez F., DomèNech G., Navarrete I., Zapata J., Ruiz R. Ad Hoc Networks 11(3): 907-925, 2013. Type: Article
This paper proposes an energy-efficient middleware structure for sensor networks. This mechanism can distinguish fallacious motions and reduce the amount of processing messages. In addition, it deals with pre-processed information usin...
|
Sep 4 2013 |
|
|
|
|
|
|
Capillary networks: a novel networking paradigm for urban environments Augé-Blum I., Boussetta K., Rivano H., Stanica R., Valois F. UrbaNe 2012 (Proceedings of the First Workshop on Urban Networking, Nice, France, Dec 10-13, 2012) 25-30, 2012. Type: Proceedings
This paper proposes capillary networks for urban environments. The authors present heterogeneous networks designed to improve urban network services and take advantage of Wi-Fi access points to reduce the loads of cellular networks.
|
Feb 20 2013 |
|
|
|
|
|
|
A comparative study on simulation vs. real time deployment in wireless sensor networks Shakshuki E., Malik H., Sheltami T. Journal of Systems and Software 84(1): 45-54, 2011. Type: Article
In this paper, the authors examine S-MAC, an agent-based sensor media access control (MAC) protocol that “ignores the lower layer effects such as packet collision and overhearing [in real deployment]” and provides a...
|
Mar 11 2011 |
|
|
|
|
|
|
Towards update-conscious compilation for energy-efficient code dissemination in WSNs Li W., Zhang Y., Yang J., Zheng J. ACM Transactions on Architecture and Code Optimization 6(4): 1-33, 2009. Type: Article
In this paper, Li et al. propose an update-conscious compilation (UCC) mechanism that reduces and minimizes the code size from the optimized intermediate representation (IR) stage to the binary code generation stage....
|
Jan 19 2011 |
|
|
|
|
|
|
Reliable and efficient reprogramming in sensor networks Miller C., Poellabauer C. ACM Transactions on Sensor Networks 7(1): 1-32, 2010. Type: Article
Miller and Poellabauer propose in this paper a reliable and efficient reprogramming method for sensor networks that exploits a reliable transport protocol, PALER, for binary code distribution, saving energy and providing high efficienc...
|
Jan 6 2011 |
|
|
|
|
|
|
Using virtual topologies to manage inter-domain QoS in next-generation networks Freitas R., De Paula L., Madeira E., Verdi F. International Journal of Network Management 20(3): 111-128, 2010. Type: Article
Freitas et al. propose virtual topologies to manage inter-domain quality of service (QoS) in next-generation networks (NGNs). They consider several scenarios of “the client and target node movement” and “t...
|
Oct 7 2010 |
|
|
|
|
|
|
Digimatge, a rich internet application for video retrieval from a multimedia asset management system Giro-i-Nieto X., Salla R., Vives X. MIR 2010 (Proceedings of the International Conference on Multimedia Information Retrieval, Philadelphia, PA, Mar 29-31, 2010) 425-428, 2010. Type: Proceedings
A video retrieval approach from a multimedia asset manager of a TV broadcaster archive is described in this paper. Its main contribution is to take texts and visual descriptors as retrieval inputs and provide distribution architectures...
|
Sep 29 2010 |
|
|
|
|
|
|
Learning based opportunistic admission control algorithm for MapReduce as a service Dhok J., Maheshwari N., Varma V. ISEC 2010 (Proceedings of the 3rd India Software Engineering Conference, Mysore, India, Feb 25-27, 2010) 153-160, 2010. Type: Proceedings
Dhok, Maheshwari, and Varma propose an admission control algorithm based on Hadoop’s MapReduce mechanisms for cloud computing....
|
May 28 2010 |
|
|
|
|
|
|
Wireless insecurity: examining user security behavior on public networks Chenoweth T., Minch R., Tabor S. Communications of the ACM 53(2): 134-138, 2010. Type: Article
This study reveals that malicious software is widespread, and most users ignore the potential risks of using wireless networks for business transactions. Since wireless communication is exposed to an open environment, many wireless hac...
|
Apr 30 2010 |
|
|
|
|
|
|
|
|
|
|
|