Sciweavers

950 search results - page 71 / 190
» presence 2008
Sort
View
NTMS
2008
IEEE
15 years 4 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran
PIMRC
2008
IEEE
15 years 4 months ago
Throughput optimization for multipath unicast routing under probabilistic jamming
Abstract—We present a framework for throughput optimization for multipath unicast routing in wireless networks in the presence of probabilistic jamming. The framework introduces ...
Patrick Tague, Sidharth Nabar, James A. Ritcey, Da...
PIMRC
2008
IEEE
15 years 4 months ago
Connectivity of wireless ad hoc networks with random beamforming: An analytical approach
Random beamforming, where each node selects a main beam direction without any coordination with other nodes, has been proposed as a simple technique to improve connectivity in wire...
Salman Durrani, Xiangyun Zhou, Haley M. Jones
PIMRC
2008
IEEE
15 years 4 months ago
A distributed extended information filter for Self-Localization in Sensor Networks
—In this paper the Self-Localization problem for Sensor Networks is addressed. Given a set of nodes deployed in an environment, self-localization consists of finding out the loc...
Andrea Gasparri, Federica Pascucci, Giovanni Ulivi
SEMCO
2008
IEEE
15 years 4 months ago
A Comparative Study of Feature Extraction Algorithms in Customer Reviews
The paper systematically compares two feature extraction algorithms to mine product features commented on in customer reviews. The first approach [17] identifies candidate featu...
Liliana Ferreira, Niklas Jakob, Iryna Gurevych