Sciweavers

114 search results - page 21 / 23
» A Predictive Collision Avoidance Model for Pedestrian Simula...
Sort
View
SAC
2010
ACM
14 years 2 months ago
Coverage-hole trap model in target tracking using distributed relay-robot network
Target tracking is an important issue in wireless sensor network applications. In this paper, we design a Coverage-Hole Trap Model (CTM) based on a system that contains one moving...
Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian...
SIGMETRICS
2004
ACM
105views Hardware» more  SIGMETRICS 2004»
14 years 29 days ago
A model of BGP routing for network engineering
The performance of IP networks depends on a wide variety of dynamic conditions. Traffic shifts, equipment failures, planned maintenance, and topology changes in other parts of th...
Nick Feamster, Jared Winick, Jennifer Rexford
ICDE
2006
IEEE
163views Database» more  ICDE 2006»
14 years 9 months ago
A Sampling-Based Approach to Optimizing Top-k Queries in Sensor Networks
Wireless sensor networks generate a vast amount of data. This data, however, must be sparingly extracted to conserve energy, usually the most precious resource in battery-powered ...
Adam Silberstein, Carla Schlatter Ellis, Jun Yang ...
AUTOMATICA
2008
108views more  AUTOMATICA 2008»
13 years 7 months ago
Closed-loop identification of multivariable systems: With or without excitation of all references?
The accuracy of plant parameters estimated in closed-loop operation is investigated for a class of multivariable systems and for the situation where only some of the reference inp...
Ljubisa Miskovic, Alireza Karimi, Dominique Bonvin...
IDEAL
2010
Springer
13 years 5 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...