Sciweavers

641 search results - page 101 / 129
» Performance and Effectiveness Analysis of Checkpointing in M...
Sort
View
GLOBECOM
2009
IEEE
15 years 6 months ago
QOMB: A Wireless Network Emulation Testbed
—In this paper we present QOMB, a testbed we designed and implemented for the evaluation of wireless network systems, protocols and applications. The testbed uses the wireless ne...
Razvan Beuran, Lan Tien Nguyen, Toshiyuki Miyachi,...
VOTEID
2007
Springer
15 years 5 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
ICIAR
2005
Springer
15 years 5 months ago
Text-Pose Estimation in 3D Using Edge-Direction Distributions
Abstract. This paper presents a method for estimating the orientation of planar text surfaces using the edge-direction distribution (EDD) extracted from the image as input to a neu...
Marius Bulacu, Lambert Schomaker
CORR
2010
Springer
91views Education» more  CORR 2010»
14 years 12 months ago
Fundamental Limits of Wideband Localization - Part II: Cooperative Networks
The availability of positional information is of great importance in many commercial, governmental, and military applications. Localization is commonly accomplished through the use...
Yuan Shen, Henk Wymeersch, Moe Z. Win
INFOCOM
2010
IEEE
14 years 10 months ago
Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks
—Neighbor discovery is a fundamental requirement and need be done frequently in underwater acoustic networks (UANs) with floating node mobility. In hostile environments, neighbo...
Rui Zhang, Yanchao Zhang