Sciweavers

1080 search results - page 95 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
CORR
2008
Springer
126views Education» more  CORR 2008»
14 years 10 months ago
MIMO Two-way Relay Channel: Diversity-Multiplexing Tradeoff Analysis
A multi-hop two-way relay channel is considered in which all the terminals are equipped with multiple antennas. Assuming independent quasi-static Rayleigh fading channels and chann...
Deniz Gündüz, Andrea J. Goldsmith, H. Vi...
GLOBECOM
2010
IEEE
14 years 8 months ago
Analysis of Messaging Load in a P2PP Overlay Network under Churn
We analyze the performance of a DHT-based P2P overlay network in resource access and overlay maintenance activities. We use a cross-platform implementation of the protocol called P...
Otso Kassinen, Erkki Harjula, Mika Ylianttila
COMSWARE
2006
IEEE
15 years 1 months ago
Architecting protocol stack optimizations on mobile devices
Applications using traditional protocol stacks (e.g TCP/IP) from wired networks do not function efficiently in mobile wireless scenarios. This is primarily due to the layered archi...
Vijay T. Raisinghani, Sridhar Iyer
ICDAR
2009
IEEE
15 years 4 months ago
Rejection Strategies with Multiple Classifiers for Handwritten Character Recognition
With rejection strategies in a handwriting recognition system, we are able to improve the reliability and accuracy of the recognized characters. In this paper, we propose several ...
Xu-Cheng Yin, Hong-Wei Hao, Yun-Feng Tang, Jun Sun...
CLEAR
2007
Springer
271views Biometrics» more  CLEAR 2007»
15 years 4 months ago
The AIT Multimodal Person Identification System for CLEAR 2007
This paper presents the person identification system developed at Athens Information Technology and its performance in the CLEAR 2007 evaluations. The system operates on the audiov...
Andreas Stergiou, Aristodemos Pnevmatikakis, Lazar...