Sciweavers

342 search results - page 49 / 69
» Performance Analysis of an Application-level Cooperative Con...
Sort
View
WISA
2009
Springer
14 years 3 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...
JSAC
2006
130views more  JSAC 2006»
13 years 8 months ago
Performance Preserving Topological Downscaling of Internet-Like Networks
Abstract--The Internet is a large, heterogeneous system operating at very high speeds and consisting of a large number of users. Researchers use a suite of tools and techniques in ...
Fragkiskos Papadopoulos, Konstantinos Psounis, Ram...
PAMI
2006
186views more  PAMI 2006»
13 years 8 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...
MOBIHOC
2005
ACM
14 years 8 months ago
Scalable location services for hierarchically organized mobile ad hoc networks
This paper proposes a location service to assist location-based routing protocols, realized through a novel Associativity-Based clustering protocol. The main goal of our scheme, w...
Siva Sivavakeesar, George Pavlou
WCNC
2008
IEEE
14 years 3 months ago
Quantize-and-Forward Relaying with M-ary Phase Shift Keying
Abstract—Using cooperative transmission, two or more singleantenna users can share their antennas to achieve spatial diversity in a slow fading channel. One relaying protocol tha...
Michael R. Souryal, Huiqing You