Sciweavers

688 search results - page 60 / 138
» Extracting the abstraction pyramid from complex networks
Sort
View
JSAC
2010
130views more  JSAC 2010»
14 years 8 months ago
Distributed target tracking using signal strength measurements by a wireless sensor network
Abstract—Wireless Sensor Networks are well suited for tracking targets carrying RFID tags in indoor environments. Tracking based on the received signal strength indication (RSSI)...
Anand Oka, Lutz H.-J. Lampe
ICDCS
2010
IEEE
14 years 12 months ago
Using Analog Network Coding to Improve the RFID Reading Throughput
Abstract—RFID promises to revolutionize the inventory management in large warehouses, retail stores, hospitals, transportation systems, etc. Periodically reading the IDs of the t...
Ming Zhang, Tao Li, Shigang Chen, Bo Li
JASIS
2008
76views more  JASIS 2008»
14 years 10 months ago
Using importance flooding to identify interesting networks of criminal activity
Abstract. In spite of policy concerns and high costs, the law enforcement community is investing heavily in data sharing initiatives. Cross-jurisdictional criminal justice informat...
Byron Marshall, Hsinchun Chen, Siddharth Kaza
CISS
2008
IEEE
15 years 4 months ago
Overlay protection against link failures using network coding
Abstract—This paper introduces a network coding-based protection scheme against single and multiple link failures. The proposed strategy makes sure that in a connection, each nod...
Ahmed E. Kamal, Aditya Ramamoorthy
TROB
2008
97views more  TROB 2008»
14 years 9 months ago
Physical Path Planning Using a Pervasive Embedded Network
Abstract--We evaluate a technique that uses an embedded network deployed pervasively throughout an environment to aid robots in navigation. The embedded nodes do not know their abs...
Keith J. O'Hara, Daniel B. Walker, Tucker R. Balch