Sciweavers

6122 search results - page 1162 / 1225
» Securing network access in wireless sensor networks
Sort
View
EMMCVPR
2003
Springer
15 years 10 months ago
Asymptotic Characterization of Log-Likelihood Maximization Based Algorithms and Applications
The asymptotic distribution of estimates that are based on a sub-optimal search for the maximum of the log-likelihood function is considered. In particular, estimation schemes that...
Doron Blatt, Alfred O. Hero
IPSN
2010
Springer
16 years 6 days ago
High-resolution, low-power time synchronization an oxymoron no more
We present Virtual High-resolution Time (VHT), a powerproportional time-keeping service that offers a baseline power draw of a low-speed clock (e.g. 32 kHz crystal), but provides...
Thomas Schmid, Prabal Dutta, Mani B. Srivastava
HPDC
2003
IEEE
15 years 10 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
ICC
2008
IEEE
106views Communications» more  ICC 2008»
15 years 12 months ago
Performance Evaluation of BICM-OFDM Systems Impaired by UWB Interference
— In this paper, we propose a theoretical framework for the analysis of the impact of ultra–wideband (UWB) interference on systems that use the popular combination of bit– in...
Amir Nasri, Robert Schober, Lutz H.-J. Lampe
VTC
2008
IEEE
161views Communications» more  VTC 2008»
15 years 11 months ago
Using WLAN Infrastructure for Angle-of-Arrival Indoor User Location
—This paper investigates the potential for future multiple antenna wireless local area network technologies such as 802.11n to perform indoor network-based positioning using angl...
Carl Wong, Richard Klukas, Geoffrey G. Messier
« Prev « First page 1162 / 1225 Last » Next »