Sfoglia per Soggetto "Communication"
Items 21-35 di 35
-
A low-cost and simple-to-deploy peer-to-peer wireless network based on open source linux routers
(2005)In this paper we present our work towards deploying a community wireless network with ad hoc communication and routing between its elements. We describe our network model and implementation of wireless routers, while ... -
Medical misinformation in mass and social media: An urgent call for action, especially during epidemics
(2020)[No abstract available] -
Multiple access with asynchronous broadcasting in wireless cooperative networks
(2013)In this paper we present a multiple access scheme for wireless networks that allows multiple nodes to broadcast their packets simultaneously. The simultaneously broadcasted packets are superimposed with a random pattern ... -
New channel allocation techniques for power efficient WiFi networks
(2010)Energy efficiency becomes evergreen than ever before. Over the last few years a significant research in wireless communications, aiming to enhance communications efficiency subject to constraint of power consumption, has ... -
Node clustering in wireless sensor networks by considering structural characteristics of the network graph
(2007)The deployment of wireless sensor networks in many application areas, e.g., aggregation services, requires self-organization of the network nodes into clusters. Quite a lot of node clustering techniques have appeared in ... -
On the structure and evolution of vehicular networks
(2009)Vehicular ad hoc networks have emerged recently as a platform to support intelligent inter-vehicle communication and improve traffic safety and performance. The road-constrained and high mobility of the vehicles, their ... -
Online graph exploration with advice
(2012)We study the problem of exploring an unknown undirected graph with non-negative edge weights. Starting at a distinguished initial vertex s, an agent must visit every vertex of the graph and return to s. Upon visiting a ... -
P/S sockets: Supporting publish/subscribe communication through the standard socket API
(2013)While the address-oriented datagram and reliable stream services supported by the UDP and TCP protocols are the foundation of distributed computing, other forms of communication are increasingly being used to build ... -
Programming and control of an industrial robotic system
(2002)The importance of robotic systems in the automation of industrial units is well known. In this paper is described the logic programming and computer control system of a robotic manipulator (IBM Scara robot) utilized in ... -
Queueing model and optimization of packet dropping in real-time wireless sensor networks
(2012)We consider the problem of modeling the transmission of real-time data from a single node of a wireless sensor network to the next hop or access point. Generated packets are placed in a single position buffer and are ... -
Service differentiation in multitier data centers
(2013)In this paper, we study the problem of resource allocation in the setting of multitier data centers. Our main motivation and objective is to provide applications hosted in the data center with different service levels. In ... -
SiLang: Culturally oriented language skill development in line with workplace needs
(2013)This paper introduces siLang, a serious gaming approach for situated learning of vehicular languages. Otherwise referred to as lingua franca, these languages are commonly understood and used across communities. They ... -
Strengthening the assessment of self-talk in sports through a multi-method approach
(2020)Although self-talk during competitive sports is common and predictive of athletes' motivation, experiences, and performance, it is difficult to accurately assess self-talk. An important, yet underexplored, next step in the ... -
Visual self-images of scientists and science in Greece
(2013)A popular and well-established image of scientists and science dominates in the public field, signifying a contradictory and multifaceted combination of stereotypes. This paper investigates crucial aspects of the visual ... -
Voice interactive personalized security (VoIPSEC) protocol: Fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification
(2006)Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...