Sciweavers

798 search results - page 60 / 160
» presence 2006
Sort
View
ICPR
2006
IEEE
15 years 3 months ago
An Iterative Algorithm for Segmentation of Isolated Handwritten Words in Gurmukhi Script
Segmentation of handwritten text in Gurmukhi script is an uphill task primarily because of the structural features of the script and varied writing styles. The presence of a horiz...
Dharam Veer Sharma, Gurpreet Singh Lehal
IWCMC
2006
ACM
15 years 3 months ago
Analysis of mobile beacon aided in-range localization scheme in ad hoc wireless sensor networks
In this paper, We mathematically model the In-Range localization scheme in the presence of a Mobile Beacon. In the In-Range localization scheme, a sensor with unknown location is ...
T. V. Srinath, Anil Kumar Katti, V. S. Ananthanara...
PEWASUN
2006
ACM
15 years 3 months ago
Revisiting neighbor discovery with interferences consideration
In wireless multi-hop networks, hello protocols for neighbor discovery are a basic service offered by the networking stack. However, their study usually rely on rather simplistic...
Elyes Ben Hamida, Guillaume Chelius, Eric Fleury
SENSYS
2006
ACM
15 years 3 months ago
Experimental study of concurrent transmission in wireless sensor networks
We undertake a systematic experimental study of the effects of concurrent packet transmissions in low-power wireless networks. Our measurements, conducted with Mica2 motes equippe...
Dongjin Son, Bhaskar Krishnamachari, John S. Heide...
CCR
2006
76views more  CCR 2006»
14 years 9 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato