Sciweavers

1586 search results - page 116 / 318
» Integrated Network Experimentation using Simulation and Emul...
Sort
View
TMC
2012
13 years 15 days ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
ICCBR
2005
Springer
15 years 3 months ago
Evaluating Case-Based Systems in Virtual Games
TIELT is a software testbed that facilitates the integration and testing of learning-embedded decision systems on user-selected tasks from virtual gaming simulators. A key componen...
Keith Needels, Matthew Molineaux, David W. Aha
IGARSS
2009
14 years 7 months ago
Inversion Algorithm for Estimating Radio Frequency Interference Characteristics based on Kurtosis Measurements
- An inversion algorithm is developed to recover power and duty-cycle of incoming Radio Frequency Interference (RFI) signals from kurtosis. The algorithm applies simulated annealin...
Sidharth Misra, Christopher Ruf
BROADBAND
1998
14 years 11 months ago
CAC investigation for video and data
A key objective of ATM-based networks is to provide at the same time guaranteed QoS to real time and non-real time services. This calls for thoroughly engineered traffic control m...
E. Aarstad, Søren Blaabjerg, Fernando Cerd&...
EMNETS
2007
15 years 2 months ago
Sensor node localisation using a stereo camera rig
In this paper, we use stereo vision processing techniques to detect and localise sensors used for monitoring simulated environmental events within an experimental sensor network t...
Dermot Diamond, Noel E. O'Connor, Alan F. Smeaton,...