Sciweavers

39 search results - page 6 / 8
» Access Point Localization Using Local Signal Strength Gradie...
Sort
View
JSAC
2010
138views more  JSAC 2010»
13 years 6 months ago
Dynamic conjectures in random access networks using bio-inspired learning
—Inspired by the biological entities’ ability to achieve reciprocity in the course of evolution, this paper considers a conjecture-based distributed learning approach that enab...
Yi Su, Mihaela van der Schaar
NIPS
2007
13 years 9 months ago
Locality and low-dimensions in the prediction of natural experience from fMRI
Functional Magnetic Resonance Imaging (fMRI) provides dynamical access into the complex functioning of the human brain, detailing the hemodynamic activity of thousands of voxels d...
Francois Meyer, Greg Stephens
VTC
2007
IEEE
14 years 1 months ago
User Demand Based WLAN Design and Optimisation
— The rapid increase in the use of IEEE 802.11 Wireless Local Area Networks (WLAN) for a diverse range of applications, has introduced an increased complexity into WLAN design, a...
Alan McGibney, Martin Klepal, Dirk Pesch
JMIV
1998
130views more  JMIV 1998»
13 years 7 months ago
Topological Numbers and Singularities in Scalar Images: Scale-Space Evolution Properties
Singular points of scalar images in any dimensions are classified by a topological number. This number takes integer values and can efficiently be computed as a surface integral ...
Stiliyan Kalitzin, Bart M. ter Haar Romeny, Alfons...
WS
2006
ACM
14 years 1 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton