Sciweavers

1665 search results - page 203 / 333
» Monitoring Timing Constraints in Distributed Real-Time Syste...
Sort
View
RAID
2010
Springer
15 years 2 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
IPSN
2010
Springer
15 years 10 months ago
Distributed estimation of linear acceleration for improved accuracy in wireless inertial motion capture
Motion capture using wireless inertial measurement units (IMUs) has many advantages over other techniques. Achieving accurate tracking with IMUs presents a processing challenge, e...
A. D. Young, M. J. Ling, D. K. Arvind
ICC
2008
IEEE
119views Communications» more  ICC 2008»
15 years 10 months ago
HSUPA Scheduling Algorithms Utilizing RoT Measurements and Interference Cancellations
—This paper discusses several important aspects in the HSUPA scheduling algorithms. First, it clearly demonstrates the benefit of explicitly utilizing the directly measured Rise-...
Danlu Zhang, Sharad Sambhwani, Bibhu Mohanty
LCN
2006
IEEE
15 years 10 months ago
ROADNet: A network of SensorNets
As sensor networks become denser and more widely deployed, the potential develops for interconnecting these networks to combine datasets, share technological solutions, and to con...
Todd Hansen, Sameer Tilak, Steve Foley, Kent Lindq...
ACIVS
2009
Springer
15 years 1 months ago
Concealed Object Perception and Recognition Using a Photometric Stereo Strategy
Abstract. Following a review of current hidden objects detection techniques in a range of security applications, a strategy based on an innovative, low-cost photometric stereo tech...
Jiuai Sun, Melvyn L. Smith, Abdul R. Farooq, Lyndo...