Sciweavers

1436 search results - page 67 / 288
» Personalized Redirection of Communication
Sort
View
JAISE
2011
238views more  JAISE 2011»
14 years 9 months ago
A bio-inspired system model for interactive surveillance applications
Advances in computer vision and pattern recognition research are leading to video surveillance systems with improved scene analysis capabilities. However, up to now few works have ...
Alessio Dore, Matteo Pinasco, Lorenzo Ciardelli, C...
SIGCOMM
2012
ACM
13 years 5 months ago
Predicting location using mobile phone calls
Location prediction using mobile phone traces has attracted increasing attention. Owing to the irregular user mobility patterns, it still remains challenging to predict user locat...
Daqiang Zhang, Athanasios V. Vasilakos, Haoyi Xion...
91
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
A Simulation Study of CSMA/CA Performance in 60 GHz WPANs
— Recently, there has been an increasing interest in developing 60 GHz wireless personal area networks (WPANs) for short-range high-speed wireless communications. Both industrial...
Wei Zhou, Sai Shankar Nandagopalan, Daji Qiao
DATE
2008
IEEE
116views Hardware» more  DATE 2008»
15 years 9 months ago
A Virtual Prototype for Bluetooth over Ultra Wide Band System Level Design
The industry is merging two different Wireless Personal Area Networks (WPAN) technologies: Bluetooth (BT) and WiMedia Ultra Wide Band (UWB), into a single BT over UWB (BToUWB) spe...
Alexandre Lewicki, Javier del Prado Pavon, Jacky T...
ISCC
2008
IEEE
15 years 9 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...