Sciweavers

1150 search results - page 107 / 230
» Beacon Based Authentication
Sort
View
PERVASIVE
2009
Springer
14 years 3 months ago
Methodologies for Continuous Cellular Tower Data Analysis
This paper presents novel methodologies for the analysis of continuous cellular tower data from 215 randomly sampled subjects in a major urban city. We demonstrate the potential of...
Nathan Eagle, John A. Quinn, Aaron Clauset
ICC
2007
IEEE
121views Communications» more  ICC 2007»
14 years 3 months ago
Global Control Plane Architecture for Cognitive Radio Networks
— This paper presents an architecture for adaptive cognitive radio networks based on the concept of a “global control plane”. The proposed control architecture uses a predete...
Xiangpeng Jing, Dipankar Raychaudhuri
INFOCOM
2007
IEEE
14 years 3 months ago
Border Games in Cellular Networks
— In each country today, cellular networks operate on carefully separated frequency bands. This careful separation is imposed by the regulators of the given country to avoid the ...
Márk Félegyházi, Mario Cagalj...
ICRA
2006
IEEE
87views Robotics» more  ICRA 2006»
14 years 3 months ago
Fast Localization of Avalanche Victims using Sum of Gaussians
— The probability of finding alive a person buried by a snow avalanche decreases dramatically with time. The best chance for the victims is to carry an avalanche beacon or ARVA ...
Pedro Pinies, Juan D. Tardós
IROS
2006
IEEE
113views Robotics» more  IROS 2006»
14 years 3 months ago
Localization of avalanche victims using robocentric SLAM
— A person buried by a snow avalanche can be found by measuring the magnetic field generated by an avalanche beacon or ARVA carried by the victim. However, the signals received ...
Pedro Pinies, Juan D. Tardós, José N...