Sciweavers

4985 search results - page 884 / 997
» Re-Configurable Computing in Wireless
Sort
View
GLOBECOM
2008
IEEE
15 years 10 months ago
Link Rate Allocation under Bandwidth and Energy Constraints in Sensor Networks
—In sensor networks, both energy and bandwidth are scarce resources. In the past, many energy efficient routing algorithms have been devised in order to maximize network lifetim...
Maggie X. Cheng, Xuan Gong, Lin Cai
138
Voted
GLOBECOM
2008
IEEE
15 years 10 months ago
MIMO Receiver Design in the Presence of Radio Frequency Interference
—Multi-input multi-output (MIMO) receivers have been designed and their communication performance analyzed under the assumption of additive Gaussian noise. Wireless transceivers,...
Kapil Gulati, Aditya Chopra, Robert W. Heath Jr., ...
111
Voted
HICSS
2008
IEEE
115views Biometrics» more  HICSS 2008»
15 years 10 months ago
Mobile Device Profiling and Intrusion Detection Using Smart Batteries
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detect...
Timothy Buennemeyer, Theresa M. Nelson, Lee M. Cla...
124
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Optimized distributed 2D transforms for irregularly sampled sensor network grids using wavelet lifting
We address the design and optimization of an energy-efficient lifting-based 2D transform for wireless sensor networks with irregular spatial sampling. The 2D transform is designe...
Godwin Shen, Antonio Ortega
INFOCOM
2008
IEEE
15 years 10 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...