Sciweavers

1474 search results - page 50 / 295
» Exploiting Locality in a TMS
Sort
View
PERCOM
2009
ACM
15 years 6 months ago
Localizing Jammers in Wireless Networks
Abstract—Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not ...
Hongbo Liu, Wenyuan Xu, Yingying Chen, Zhenhua Liu
RAS
2006
134views more  RAS 2006»
14 years 11 months ago
Simultaneous planning, localization, and mapping in a camera sensor network
In this paper we examine issues of localization, exploration, and planning in the context of a hybrid robot/camera-network system. We exploit the ubiquity of camera networks to us...
Ioannis M. Rekleitis, David Meger, Gregory Dudek
CORR
2010
Springer
126views Education» more  CORR 2010»
14 years 12 months ago
Fundamental Limits of Wideband Localization - Part I: A General Framework
The availability of positional information is of great importance in many commercial, public safety, and military applications. The coming years will see the emergence of locationa...
Yuan Shen, Moe Z. Win
POPL
2007
ACM
16 years 5 days ago
Locality approximation using time
Reuse distance (i.e. LRU stack distance) precisely characterizes program locality and has been a basic tool for memory system research since the 1970s. However, the high cost of m...
Xipeng Shen, Jonathan Shaw, Brian Meeker, Chen Din...
GLOBECOM
2007
IEEE
15 years 6 months ago
Relative Distance Based Localization for Mobile Sensor Networks
— Many sensor network applications exploit the mobility of sensor nodes and the location-awareness plays an important role in these applications. However, it is too expensive to ...
Ji Luo, Qian Zhang