Sciweavers

1009 search results - page 159 / 202
» Mass estimation and its applications
Sort
View
WOWMOM
2006
ACM
162views Multimedia» more  WOWMOM 2006»
15 years 3 months ago
Gauging VoIP Call Quality from 802.11 WLAN Resource Usage
In this paper we experimentally study the relationship between resource utilization in the wireless LAN and the quality of VoIP calls transmitted over the wireless medium. Specifi...
Miroslaw Narbutt, Mark Davis
CBMS
2005
IEEE
15 years 3 months ago
Grid Computing in 3D-EM Image Processing Using Xmipp
Image processing in three-dimensional electron microscopy (3D-EM) is characterized by large amounts of data, and voluminous computing requirements. Here, we report our first exper...
Sjors H. W. Scheres, A. J. Merino, Carlos Oscar S&...
SASN
2005
ACM
15 years 3 months ago
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Rec...
Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi ...
ATAL
2005
Springer
15 years 3 months ago
Multiagent coordination by Extended Markov Tracking
We present here Extended Markov Tracking (EMT), a computationally tractable method for the online estimation of Markovian system dynamics, along with experimental support for its ...
Zinovi Rabinovich, Jeffrey S. Rosenschein
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
15 years 3 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn