Sciweavers

84 search results - page 16 / 17
» Proximity Sensing Using IEEE 802.15.4 Radios
Sort
View
ICNP
2007
IEEE
13 years 11 months ago
Slotted Scheduled Tag Access in Multi-Reader RFID Systems
Abstract—Radio frequency identification (RFID) is a technology where a reader device can “sense” the presence of a closeby object by reading a tag device attached to the obj...
Zongheng Zhou, Himanshu Gupta, Samir R. Das, Xianj...
WCNC
2010
IEEE
13 years 3 months ago
Impact of Secondary Users' Field Size on Spectrum Sharing Opportunities
— Previous works studied the effect of many system parameters on spectrum sharing opportunities where secondary users access the spectrum of primary users. However, a parameter t...
Muhammad Aljuaid, Halim Yanikomeroglu
IPPS
2006
IEEE
13 years 11 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
13 years 10 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
ICRA
2010
IEEE
111views Robotics» more  ICRA 2010»
13 years 3 months ago
A voice-commandable robotic forklift working alongside humans in minimally-prepared outdoor environments
— One long-standing challenge in robotics is the realization of mobile autonomous robots able to operate safely in existing human workplaces in a way that their presence is accep...
Seth J. Teller, Matthew R. Walter, Matthew E. Anto...