Sciweavers

418 search results - page 15 / 84
» Source Controlled Modulation Scheme for Sources with Memory
Sort
View
VTC
2010
IEEE
185views Communications» more  VTC 2010»
13 years 5 months ago
Fuzzy Logic Aided Dynamic Source Routing in Cross-Layer Operation Assisted Ad Hoc Networks
1The classic Dynamic Source Routing (DSR) protocol opts for the route requiring the lowest number of hops for transmitting data from the source to the destination. However, owing t...
Jing Zuo, Soon Xin Ng, Lajos Hanzo
RECSYS
2009
ACM
14 years 2 months ago
Assessment of conversation co-mentions as a resource for software module recommendation
Conversation double pivots recommend target items related to a source item, based on co-mentions of source and target items in online forums. We deployed several variants on the d...
Daniel Xiaodan Zhou, Paul Resnick
TSP
2010
13 years 2 months ago
On scalable distributed coding of correlated sources
Abstract--This paper considers the problem of scalable distributed coding of correlated sources that are communicated to a central unit, a setting typically encountered in sensor n...
Ankur Saxena, Kenneth Rose
ADHOCNOW
2006
Springer
14 years 1 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou
ICASSP
2011
IEEE
12 years 11 months ago
A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding
Biometric secret-key binding inherently requires signal processing and error correction schemes due to noisy measurement readings. Two previously proposed strategies, Quantization...
Aniketh Talwai, Francis Minhthang Bui, Ashish Khis...