Sciweavers

537 search results - page 57 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
PAMI
2007
121views more  PAMI 2007»
14 years 9 months ago
Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation
— In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is uniq...
Sébastien Marcel, José del R. Mill&a...
IPSN
2005
Springer
15 years 3 months ago
Virtual patrol: a new power conservation design for surveillance using sensor networks
Surveillance has been a typical application of wireless sensor networks. To conduct surveillance of a given area in real life, one can use stationary watch towers, or can also use...
Chao Gui, Prasant Mohapatra
MICCAI
2001
Springer
15 years 2 months ago
Repeatability and Accuracy of Ankle Centre Location Estimates Using a Biaxial Joint Model
In conventional total knee replacement (TKR) surgery, a significant fraction of implants have varus/valgus alignment errors large enough to reduce the lifespan of the implant, so w...
Cameron A. Shute, Antony J. Hodgson
UIC
2007
Springer
15 years 4 months ago
Maximizing Network Lifetime Under Reliability Constraints Using a Cross-Layer Design in Dense Wireless Sensor Networks
Abstract. Recent experimental studies have shown that radio links between low-power devices are extremely unreliable. In particular, the instability and unpredictability of low-pow...
Shan Guo Quan, Young Yong Kim
MM
2004
ACM
145views Multimedia» more  MM 2004»
15 years 3 months ago
Proportional service differentiation in wireless LANs using spacing-based channel occupancy regulation
In this paper, we propose Spacing-based Channel Occupancy Regulation (SCORE) MAC protocol that provides proportional service differentiation in terms of normalized throughput in w...
Qi Xue, Aura Ganz