Sciweavers

5068 search results - page 937 / 1014
» Basic Computations in Wireless Networks
Sort
View
PERCOM
2009
ACM
15 years 4 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
GLVLSI
2009
IEEE
154views VLSI» more  GLVLSI 2009»
15 years 4 months ago
Design of a maximum-likelihood detector for cooperative communications in intersymbol interference channels
Recently, cooperative communication has attracted a lot of attention for its potential to increase spatial diversity. However, limited attention has been paid to the physical laye...
Yanjie Peng, Andrew G. Klein, Xinming Huang
FGCN
2008
IEEE
131views Communications» more  FGCN 2008»
15 years 4 months ago
Object Tracking of Mobile Robot Using Moving Color and Shape Information for the Aged Walking
A mobile robot with various types of sensors via ubiquitous networks is introduced. We designed a mobile robot composed of TCP/IP network, wireless camera and several sensors in a...
Sanghoon Kim, Sangmu Lee, Seungjong Kim
VTC
2008
IEEE
150views Communications» more  VTC 2008»
15 years 4 months ago
Impact of Signaling Load on the UMTS Call Blocking/Dropping
— Radio resources in the third generation (3G) wireless cellular networks (WCNs) such as the universal mobile telecommunications system (UMTS) network is limited in term of soft ...
Saowaphak Sasanus, David Tipper, Yi Qian
WCNC
2008
IEEE
15 years 4 months ago
Genetic Algorithm Aided Design of Near-Capacity Irregular Variable Length Codes
— In this paper we demonstrate that our ability to match the EXtrinsic Information Transfer (EXIT) function of an Irregular Variable Length Code (IrVLC) to that of a seriallyconc...
Robert G. Maunder, Lajos Hanzo