Sciweavers

811 search results - page 78 / 163
» When Novelty Is Not Enough
Sort
View
ICC
2007
IEEE
107views Communications» more  ICC 2007»
14 years 4 months ago
Evaluation of Security for DSSS Under Repeater Jamming
—Direct sequence spread spectrum (DSSS) technique has been widely used in both military communications and commercial communications. On the other hand, it is a challenge to both...
Hang Wang, Jingbo Guo, Zanji Wang
ICDS
2007
IEEE
14 years 4 months ago
On Burst Loss in Optical Burst Switched Networks with Hot Potato Deflection Routing
In this article we investigate the effects of increased Control Packet lead Time (CPT) on the loss probability of bursts in an OBS network with deflection routing. In particular w...
Stein Gjessing
ICNP
2007
IEEE
14 years 4 months ago
Lexicographic products in metarouting
— Routing protocols often keep track of multiple route metrics, where some metrics are more important than others. Route selection is then based on lexicographic comparison: the ...
Alexander J. T. Gurney, Timothy G. Griffin
VTC
2007
IEEE
159views Communications» more  VTC 2007»
14 years 3 months ago
Data Fragmentation Scheme in IEEE 802.15.4 Wireless Sensor Networks
— The IEEE 802.15.4 Medium Access Control (MAC) protocol is designed for low data rate, short distance and low power communication applications such as Wireless Sensor Networks (...
Jongwon Yoon, Hyogon Kim, Jeong-Gil Ko
ACCV
2007
Springer
14 years 3 months ago
Viewpoint Insensitive Action Recognition Using Envelop Shape
Action recognition is a popular and important research topic in computer vision. However, it is challenging when facing viewpoint variance. So far, most researches in action recogn...
Feiyue Huang, Guangyou Xu