Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Lin, HY
Dept. of Management Information System, China University of Technology, Taiwan, R.O.C.
Taipei, Taiwan
 
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 19 reviews

   
  A stochastic process model of the hop count distribution in wireless sensor networks
Beyme S., Leung C. Ad Hoc Networks 1760-70, 2014.  Type: Article

In general, this is an appropriate paper with fine structures, methodologies, analyses, and detailed simulation on a proposed stochastic process model for the hop count distribution in wireless sensor networks (WSNs). The authors give ...

Jan 22 2015  
  An energy efficient middleware for an ad-hoc AAL wireless sensor network
Fernandez-Luque F., PéRez D., MartíNez F., DomèNech G., Navarrete I., Zapata J., Ruiz R. Ad Hoc Networks 11(3): 907-925, 2013.  Type: Article

This paper proposes an energy-efficient middleware structure for sensor networks. This mechanism can distinguish fallacious motions and reduce the amount of processing messages. In addition, it deals with pre-processed information usin...

Sep 4 2013  
  Capillary networks: a novel networking paradigm for urban environments
Augé-Blum I., Boussetta K., Rivano H., Stanica R., Valois F.  UrbaNe 2012 (Proceedings of the First Workshop on Urban Networking, Nice, France, Dec 10-13, 2012) 25-30, 2012.  Type: Proceedings

This paper proposes capillary networks for urban environments. The authors present heterogeneous networks designed to improve urban network services and take advantage of Wi-Fi access points to reduce the loads of cellular networks.
Feb 20 2013  
  A comparative study on simulation vs. real time deployment in wireless sensor networks
Shakshuki E., Malik H., Sheltami T. Journal of Systems and Software 84(1): 45-54, 2011.  Type: Article

In this paper, the authors examine S-MAC, an agent-based sensor media access control (MAC) protocol that “ignores the lower layer effects such as packet collision and overhearing [in real deployment]” and provides a...

Mar 11 2011  
  Towards update-conscious compilation for energy-efficient code dissemination in WSNs
Li W., Zhang Y., Yang J., Zheng J. ACM Transactions on Architecture and Code Optimization 6(4): 1-33, 2009.  Type: Article

In this paper, Li et al. propose an update-conscious compilation (UCC) mechanism that reduces and minimizes the code size from the optimized intermediate representation (IR) stage to the binary code generation stage....

Jan 19 2011  
  Reliable and efficient reprogramming in sensor networks
Miller C., Poellabauer C. ACM Transactions on Sensor Networks 7(1): 1-32, 2010.  Type: Article

Miller and Poellabauer propose in this paper a reliable and efficient reprogramming method for sensor networks that exploits a reliable transport protocol, PALER, for binary code distribution, saving energy and providing high efficienc...

Jan 6 2011  
  Using virtual topologies to manage inter-domain QoS in next-generation networks
Freitas R., De Paula L., Madeira E., Verdi F. International Journal of Network Management 20(3): 111-128, 2010.  Type: Article

Freitas et al. propose virtual topologies to manage inter-domain quality of service (QoS) in next-generation networks (NGNs). They consider several scenarios of “the client and target node movement” and “t...

Oct 7 2010  
  Digimatge, a rich internet application for video retrieval from a multimedia asset management system
Giro-i-Nieto X., Salla R., Vives X.  MIR 2010 (Proceedings of the International Conference on Multimedia Information Retrieval, Philadelphia, PA, Mar 29-31, 2010) 425-428, 2010.  Type: Proceedings

A video retrieval approach from a multimedia asset manager of a TV broadcaster archive is described in this paper. Its main contribution is to take texts and visual descriptors as retrieval inputs and provide distribution architectures...

Sep 29 2010  
  Learning based opportunistic admission control algorithm for MapReduce as a service
Dhok J., Maheshwari N., Varma V.  ISEC 2010 (Proceedings of the 3rd India Software Engineering Conference, Mysore, India, Feb 25-27, 2010) 153-160, 2010.  Type: Proceedings

Dhok, Maheshwari, and Varma propose an admission control algorithm based on Hadoop’s MapReduce mechanisms for cloud computing....

May 28 2010  
  Wireless insecurity: examining user security behavior on public networks
Chenoweth T., Minch R., Tabor S. Communications of the ACM 53(2): 134-138, 2010.  Type: Article

This study reveals that malicious software is widespread, and most users ignore the potential risks of using wireless networks for business transactions. Since wireless communication is exposed to an open environment, many wireless hac...

Apr 30 2010  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy