Sciweavers

13007 search results - page 2285 / 2602
» Wireless and Mobile Networking
Sort
View
HUC
2010
Springer
15 years 5 months ago
Goal-driven opportunistic sensing
Opportunistic activity and context recognition systems do not presume a static sensor infrastructure that is defined at the design time of a system. They also do not have a fixed ...
Marc Kurz
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 4 months ago
Continuum Percolation in the Intrinsically Secure Communications Graph
The intrinsically secure communications graph (-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence...
Pedro C. Pinto, Moe Z. Win
COMCOM
2006
79views more  COMCOM 2006»
15 years 4 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
CORR
2006
Springer
107views Education» more  CORR 2006»
15 years 4 months ago
The Multiple Access Channel with Feedback and Correlated Sources
Abstract-- In this paper, we investigate communication strategies for the multiple access channel with feedback and correlated sources (MACFCS). The MACFCS models a wireless sensor...
Lawrence Ong, Mehul Motani
TIT
2008
95views more  TIT 2008»
15 years 4 months ago
Distributed Estimation Via Random Access
The problem of distributed Bayesian estimation is considered in the context of a wireless sensor network. The Bayesian estimation performance is analyzed in terms of the expected F...
Animashree Anandkumar, Lang Tong, Ananthram Swami
« Prev « First page 2285 / 2602 Last » Next »