Sciweavers

125 search results - page 18 / 25
» Certificate Based Authorization Simulation System
Sort
View
IPSN
2007
Springer
14 years 1 months ago
Robust system multiangulation using subspace methods
Sensor location information is a prerequisite to the utility of most sensor networks. In this paper we present a robust and low-complexity algorithm to self-localize and orient se...
Joshua N. Ash, Lee C. Potter
BMCBI
2007
215views more  BMCBI 2007»
13 years 7 months ago
Learning causal networks from systems biology time course data: an effective model selection procedure for the vector autoregres
Background: Causal networks based on the vector autoregressive (VAR) process are a promising statistical tool for modeling regulatory interactions in a cell. However, learning the...
Rainer Opgen-Rhein, Korbinian Strimmer
ICC
2008
IEEE
115views Communications» more  ICC 2008»
14 years 1 months ago
On the Performance of Linear Least-Squares Estimation in Wireless Positioning Systems
A common technique for wireless positioning is to estimate time-of-arrivals (TOAs) of signals traveling between a target node and a number of reference nodes, and then to determin...
Sinan Gezici, Ismail Güvenç, Zafer Sah...
TCAD
2002
146views more  TCAD 2002»
13 years 7 months ago
Static scheduling of multidomain circuits for fast functional verification
With the advent of system-on-a-chip design, many application specific integrated circuits (ASICs) now require multiple design clocks that operate asynchronously to each other. This...
Murali Kudlugi, Russell Tessier
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 2 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...