Sciweavers

235 search results - page 41 / 47
» Using simulation in the implementation of an Outpatient Proc...
Sort
View
ICPADS
2002
IEEE
15 years 4 months ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...
INFORMATICALT
2010
145views more  INFORMATICALT 2010»
14 years 9 months ago
GSM Speech Coder Indirect Identification Algorithm
This paper presents GSM speech coder indirect identification algorithm based on sending novel identification pilot signals through the GSM speech channel. Each GSM subsystem distur...
Rajko Svecko, Bojan Kotnik, Amor Chowdhury, Zdenko...
ISBMS
2010
Springer
15 years 6 months ago
Physics-Based Modeling of the Pregnant Woman
High quality obstetric images have become readily available with fast magnetic resonance imaging protocols or new 3D ultrasound probes. These obstetric images provide detailed info...
Juan Pablo de la Plata Alcalde, Lazar Bibin, J&eac...
ADHOCNOW
2009
Springer
15 years 6 months ago
SenSearch: GPS and Witness Assisted Tracking for Delay Tolerant Sensor Networks
Abstract— Mobile wireless sensor networks have to be robust against the limitations of the underlying platform. While lightweight form factor makes them an attractive choice for ...
Lun Jiang, Jyh-How Huang, Ankur Kamthe, Tao Liu, I...
ADHOC
2006
97views more  ADHOC 2006»
14 years 11 months ago
A probabilistic algorithm for efficient and robust data propagation in wireless sensor networks
We study the problem of data propagation in sensor networks, comprised of a large number of very small and low-cost nodes, capable of sensing, communicating and computing. The dis...
Ioannis Chatzigiannakis, Tassos Dimitriou, Sotiris...