Sciweavers

1512 search results - page 209 / 303
» Principles of IEEE 802.11s
Sort
View
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
15 years 10 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
VTC
2007
IEEE
192views Communications» more  VTC 2007»
15 years 10 months ago
Access Scheduling Based on Time Water-Filling for Next Generation Wireless LANs
Opportunistic user access scheduling enhances the capacity of wireless networks by exploiting the multi user diversity. When frame aggregation is used, opportunistic schemes are no...
Ertugrul Necdet Ciftcioglu, Özgür Gü...
VTC
2007
IEEE
15 years 10 months ago
Power Allocation Scheme for MIMO MC-CDMA With Two Dimensional Spreading
— In this paper, we develop a power distribution scheme for multi-input multi-output (MIMO) [1] multi-carrier (MC) code division multiple access (CDMA) systems [2]-[3] with two-d...
Wladimir Bocquet, Kazunori Hayashi, Hideaki Sakai
WACV
2007
IEEE
15 years 10 months ago
Object Categorization Robust to Surface Markings using Entropy-guided Codebook
Visual categorization is fundamentally important for autonomous mobile robots to get intelligence such as novel object acquisition and topological place recognition. The main dif...
Sungho Kim, In-So Kweon
3DPVT
2006
IEEE
202views Visualization» more  3DPVT 2006»
15 years 10 months ago
Visual Shapes of Silhouette Sets
Shape from silhouette methods are extensively used to model dynamic and non-rigid objects using binary foreground-background images. Since the problem of reconstructing shapes fro...
Jean-Sébastien Franco, Marc Lapierre, Edmon...