Sciweavers

1266 search results - page 66 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
WCNC
2008
IEEE
15 years 10 months ago
Proportional Fair Scheduling: Analytical Insight under Rayleigh Fading Environment
—This paper provides analytical expressions to evaluate the performance of a random access wireless network in terms of user throughput and network throughput, subject to the con...
Erwu Liu, Kin K. Leung
ICRA
2009
IEEE
160views Robotics» more  ICRA 2009»
15 years 10 months ago
Appearance-based loop detection from 3D laser data using the normal distributions transform
— We propose a new approach to appearance based loop detection from metric 3D maps, exploiting the NDT surface representation. Locations are described with feature histograms bas...
Martin Magnusson 0002, Henrik Andreasson, Andreas ...
ACMACE
2005
ACM
15 years 9 months ago
Rendezvous: supporting real-time collaborative mobile gaming in high latency environments
Despite the ever increasing popularity of handheld, networked gaming consoles, fully interactive real-time, multiplayer games designed for these platforms have yet to become a rea...
Angie Chandler, Joe Finney
WIOPT
2010
IEEE
15 years 2 months ago
Low complexity algorithms for relay selection and power control in interference-limited environments
Abstract—We consider an interference-limited wireless network, where multiple source-destination pairs compete for the same pool of relay nodes. In an attempt to maximize the sum...
Lazaros Gkatzikis, Iordanis Koutsopoulos
JCM
2006
169views more  JCM 2006»
15 years 4 months ago
Trends in Middleware for Mobile Ad Hoc Networks
The use of middleware has extended from simply facilitating applications' communication to a broad set of services supporting a huge spectrum of networked and distributed comp...
Salem Hadim, Jameela Al-Jaroodi, Nader Mohamed