Sciweavers

INFOCOM
2012
IEEE
12 years 10 days ago
A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks
—In this work we develop a distributed boundary detection algorithm, dubbed Coconut, for 3D wireless sensor networks. It first constructs a tetrahedral structure to delineate th...
Hongyu Zhou, Hongyi Wu, Miao Jin
ICC
2011
IEEE
257views Communications» more  ICC 2011»
12 years 9 months ago
Increasing the Lifetime of Roadside Sensor Networks Using Edge-Betweenness Clustering
Abstract—Wireless Sensor Networks are proven highly successful in many areas, including military and security monitoring. In this paper, we propose a method to use the edge–bet...
Joakim Flathagen, Ovidiu Valentin Drugan, Paal E. ...
ISCAS
2011
IEEE
237views Hardware» more  ISCAS 2011»
13 years 1 months ago
A new network-based algorithm for multi-camera abnormal activity detection
In this paper, a new abnormal activity detection algorithm is proposed for multi-camera surveillance applications. The proposed algorithm models the entire scene covered by the mu...
Hongyu Gao, Weiyao Lin, Xiaokang Yang, Hongxiang L...
VLSISP
2002
98views more  VLSISP 2002»
13 years 9 months ago
VLSI Implementation of the Multistage Detector for Next Generation Wideband CDMA Receivers
The multistage detection algorithm has been proposed as an effective interference cancellation scheme for next generation Wideband Code Division Multiple Access (W-CDMA) base stati...
Gang Xu, Sridhar Rajagopal, Joseph R. Cavallaro, B...
ESANN
2000
13 years 11 months ago
Automatic detection of clustered microcalcifications in digital mammograms using an SVM classifier
In this paper we investigate the performance of a Computer Aided Diagnosis (CAD) system for the detection of clustered microcalcifications in mammograms. Our detection algorithm co...
Armando Bazzani, Alessandro Bevilacqua, Dante Boll...
SERP
2003
13 years 11 months ago
DPET - A Simple C++ Design Pattern Extraction Tool
Design patterns provide a medium-grained ion and can be used as an effective tool for understanding object-oriented systems. This paper presents a simple tool for the extraction o...
Samuel Ajila, Peng Xie
SPIN
2000
Springer
14 years 1 months ago
Using Runtime Analysis to Guide Model Checking of Java Programs
This paper describes how two runtime analysis algorithms, an existing data race detection algorithm and a new deadlock detection algorithm, have been implemented to analyze Java pr...
Klaus Havelund
CVPR
2000
IEEE
14 years 1 months ago
Detection of Obstacles in the Flight Path of an Aircraft
The National Aeronautics and Space Administration (NASA), along with members of the aircraft industry, recently developed technologies for a new supersonic aircraft. One of the te...
Tarak Gandhi, Mau-Tsuen Yang, Rangachar Kasturi, O...
GLOBECOM
2009
IEEE
14 years 1 months ago
Experimental Validation of Periodic Codes for PON Monitoring
In this paper we investigate both experimentally and via simulation the monitoring of fiber link quality in a PON using optical coding technology. We use a new, simple and costeffe...
Mohammad M. Rad, Habib Fathallah, Sophie LaRochell...
ICMCS
2000
IEEE
94views Multimedia» more  ICMCS 2000»
14 years 2 months ago
DCT Coefficient-Based Error Detection Technique for Compressed Video Stream
: In the process of transmission of digital encoded video bit streams over physical network, the data is corrupted by random bit errors, which has a several effect on the decoded v...
K. Bhattacharyya, H. S. Jamadagni