Sciweavers

655 search results - page 51 / 131
» Fundamental bounds on the accuracy of network performance me...
Sort
View
TMC
2010
158views more  TMC 2010»
13 years 7 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...
MOBIHOC
2006
ACM
14 years 8 months ago
Starvation mitigation through multi-channel coordination in CSMA multi-hop wireless networks
Existing multi-channel protocols have been demonstrated to significantly increase aggregate throughput compared to single-channel protocols. However, we show that despite such imp...
Jingpu Shi, Theodoros Salonidis, Edward W. Knightl...
TC
2010
13 years 3 months ago
Model-Driven System Capacity Planning under Workload Burstiness
In this paper, we define and study a new class of capacity planning models called MAP queueing networks. MAP queueing networks provide the first analytical methodology to describe ...
Giuliano Casale, Ningfang Mi, Evgenia Smirni
ICC
2007
IEEE
290views Communications» more  ICC 2007»
14 years 3 months ago
Mobile Position Tracking by TDOA-Doppler Hybrid Estimation in Mobile Cellular System
Abstract— An effective method is presented for position tracking of a moving mobile terminal (MT). The method is based on time/distance difference of arrival (TDOA) estimation an...
Wen Pan, Jiang Wu, Zhanjun Jiang, Yan Wang, Xiaohu...
ICPR
2000
IEEE
14 years 1 months ago
Statistical-Based Approach to Word Segmentation
Thispaper presents a text word extraction algorithm that takes a set of bounding boxes of glyphs and their associated text lines of a given document andpartitions the glyphs into ...
Yalin Wang, Robert M. Haralick, Ihsin T. Phillips