Sciweavers

1474 search results - page 194 / 295
» Exploiting Locality in a TMS
Sort
View
139
Voted
MOBICOM
2009
ACM
15 years 11 months ago
Connectivity of cognitive radio networks: proximity vs. opportunity
We address the connectivity of large-scale ad hoc cognitive radio networks, where secondary users exploit channels temporarily and locally unused by primary users and the existenc...
Wei Ren, Qing Zhao, Ananthram Swami
WOWMOM
2009
ACM
191views Multimedia» more  WOWMOM 2009»
15 years 11 months ago
Multi-channel spectrum-agile MAC protocol with adaptive load control
Abstract— Spectrum-agile radios, also known as cognitive radios, have a great potential to improve spectrum utilization by enabling dynamic access to the spectrum. A key challeng...
Fan Wang, Marwan Krunz
ACHI
2008
IEEE
15 years 11 months ago
Tailoring Model-Based Techniques to Facial Expression Interpretation
Computers have been widely deployed to our daily lives, but human-computer interaction still lacks intuition. Researchers intend to resolve these shortcomings by augmenting tradit...
Matthias Wimmer, Christoph Mayer, Sylvia Pietzsch,...
AIPR
2008
IEEE
15 years 11 months ago
Temporal structure methods for image-based change analysis
– This paper addresses the exploitation of massive numbers of image-derived change detections. We use the term “change analysis” to emphasize the intelligence value obtained ...
Ray Rimey, Dan Keefe
APSCC
2008
IEEE
15 years 11 months ago
Analysis of Context-Aware Network Selection Schemes for Power Savings
Socio-technical developments in computing have resulted in the emergence of innovative mobile systems which exploit the information available on the Internet to optimize the perfo...
Pravin Pawar, Bert-Jan van Beijnum, Hermie Hermens...