Sciweavers

1247 search results - page 214 / 250
» A Statistical Approach to the Processing of Metonymy
Sort
View
ICASSP
2008
IEEE
15 years 4 months ago
Secure wireless communications: Secret keys through multipath
Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security protocols apply cryptographic techniques for bit sc...
Akbar M. Sayeed, Adrian Perrig
ISCAS
2005
IEEE
191views Hardware» more  ISCAS 2005»
15 years 3 months ago
Behavioural modeling and simulation of a switched-current phase locked loop
Recent work has shown that the use of switched current methods can provide an effective route to implementation of analog IC functionality using a standard digital CMOS process. Fu...
Peter R. Wilson, Reuben Wilcock
KDD
2009
ACM
266views Data Mining» more  KDD 2009»
15 years 4 months ago
OpinionMiner: a novel machine learning system for web opinion mining and extraction
Merchants selling products on the Web often ask their customers to share their opinions and hands-on experiences on products they have purchased. Unfortunately, reading through al...
Wei Jin, Hung Hay Ho, Rohini K. Srihari
86
Voted
IPSN
2005
Springer
15 years 3 months ago
Matched source-channel communication for field estimation in wireless sensor networks
Abstract— Sensing, processing and communication must be jointly optimized for efficient operation of resource-limited wireless sensor networks. We propose a novel source-channel...
Waheed Uz Zaman Bajwa, Akbar M. Sayeed, Robert D. ...
ATAL
2008
Springer
14 years 11 months ago
Multi agent based simulation of transport chains
An agent-based tool for micro-level simulation of transport chains (TAPAS) is described. It is more powerful than traditional approaches as it is able to capture the interactions ...
Paul Davidsson, Johan Holmgren, Jan A. Persson, Li...