Sciweavers

6122 search results - page 1162 / 1225
» Securing network access in wireless sensor networks
Sort
View
EMMCVPR
2003
Springer
14 years 2 months ago
Asymptotic Characterization of Log-Likelihood Maximization Based Algorithms and Applications
The asymptotic distribution of estimates that are based on a sub-optimal search for the maximum of the log-likelihood function is considered. In particular, estimation schemes that...
Doron Blatt, Alfred O. Hero
IPSN
2010
Springer
14 years 3 months ago
High-resolution, low-power time synchronization an oxymoron no more
We present Virtual High-resolution Time (VHT), a powerproportional time-keeping service that offers a baseline power draw of a low-speed clock (e.g. 32 kHz crystal), but provides...
Thomas Schmid, Prabal Dutta, Mani B. Srivastava
HPDC
2003
IEEE
14 years 2 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
ICC
2008
IEEE
106views Communications» more  ICC 2008»
14 years 3 months ago
Performance Evaluation of BICM-OFDM Systems Impaired by UWB Interference
— In this paper, we propose a theoretical framework for the analysis of the impact of ultra–wideband (UWB) interference on systems that use the popular combination of bit– in...
Amir Nasri, Robert Schober, Lutz H.-J. Lampe
VTC
2008
IEEE
161views Communications» more  VTC 2008»
14 years 3 months ago
Using WLAN Infrastructure for Angle-of-Arrival Indoor User Location
—This paper investigates the potential for future multiple antenna wireless local area network technologies such as 802.11n to perform indoor network-based positioning using angl...
Carl Wong, Richard Klukas, Geoffrey G. Messier
« Prev « First page 1162 / 1225 Last » Next »