• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 828
Next 10 →

A Rate-Adaptive MAC Protocol for Multi-Hop Wireless Networks

by Gavin Holland, Nitin H. Vaidya, Paramvir Bahl , 2001
"... Wireless local area networks (W-LANs) have become increasingly popular due to the recent availability of affordable devices that are capable of communicating at high data rates. These high rates are possible, in part, through new modulation schemes that are optimized for the channel conditions bring ..."
Abstract - Cited by 484 (5 self) - Add to MetaCart
the widely popular IEEE 802.11 protocol. Simulation results of an implementation of RBAR inside IEEE 802.11 show that RBAR performs consistently well.

MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card

by Ranveer Chandra - in IEEE INFOCOM, Hong Kong , 2004
"... Abstract — There are a number of scenarios where it is desirable to have a wireless device connect to multiple networks simultaneously. Currently, this is possible only by using multiple wireless network cards in the device. Unfortunately, using multiple wireless cards causes excessive energy drain ..."
Abstract - Cited by 193 (5 self) - Add to MetaCart
and evaluate buffering and switching algorithms in terms of delay and energy consumption. Our system has been operational for over twelve months, it is agnostic of the upper layer protocols, and works well over popular IEEE 802.11 wireless LAN cards. Keywords: System Design, Experimentation with Real Networks

Minimizing Energy for Wireless Web Access with Bounded Slowdown

by Ronny Krashinsky, Hari Balakrishnan , 2002
"... On many battery-powered mobile computing devices, the wireless network is a significant contributor to the total energy consumption. In this paper, we investigate the interaction between energy-saving protocols and TCP performance for Web-like transfers. We show that the popular IEEE 802.11 power-sa ..."
Abstract - Cited by 171 (2 self) - Add to MetaCart
On many battery-powered mobile computing devices, the wireless network is a significant contributor to the total energy consumption. In this paper, we investigate the interaction between energy-saving protocols and TCP performance for Web-like transfers. We show that the popular IEEE 802.11 power

General tensor discriminant analysis and Gabor featuresforgaitrecognition,”IEEE Trans

by Dacheng Tao, Xuelong Li, Xindong Wu, Stephen J. Maybank - Pattern Anal. Mach. Intell , 2007
"... Abstract — The traditional image representations are not suited to conventional classification methods, such as the linear discriminant analysis (LDA), because of the under sample problem (USP): the dimensionality of the feature space is much higher than the number of training samples. Motivated by ..."
Abstract - Cited by 105 (11 self) - Add to MetaCart
gait recognition to validate the proposed GTDA. The averaged gait images are utilized for gait representation. Given the popularity of Gabor function based image decompositions for image understanding and object recognition, we develop three different Gabor function based image representations: 1

Application-Specific Network Management for Energy-Aware Streaming of Popular Multimedia Formats

by Surendar Chandra, Amin Vahdat , 2002
"... The typical duration of multimedia streams makes wireless network interface (WNIC) energy consumption a particularly acute problem for mobile clients. In this work, we explore ways to transmit data packets in a predictable fashion; allowing the clients to transition the WNIC to a lower power consumi ..."
Abstract - Cited by 87 (4 self) - Add to MetaCart
consuming sleep state. First, we show the limitations of IEEE 802.11 power saving mode for isochronous multimedia streams. Without an understanding of the stream requirements, they do not offer any energy savings for multimedia streams over 56 kbps. The potential energy savings is also affected by multiple

Measurements of a wireless link in an industrial environment using an ieee 802.11-compliant physical layer

by Andreas Willig, Martin Kubisch, Christian Hoene, Adam Wolisz, Senior Member - IEEE Transactions on Industrial Electronics , 2002
"... Abstract—The design and simulation of coding schemes, Medium Access Control (MAC), and link-layer protocols for future industrial wireless local area networks can be supported by some understanding of the statistical properties of the bit error patterns delivered by a wireless link (which is an ense ..."
Abstract - Cited by 106 (16 self) - Add to MetaCart
. Furthermore, we show that the popular Gilbert/Elliot model and a modified version of it are a useful tool for simulating bit errors on a wireless link, despite their simplicity and failure to match certain measured statistics. Index Terms—IEEE 802.11 wireless local area network (WLAN), industrial environment

Pilar Gómez-Gil, IEEE Senior Member Universidad Popular Autónoma del

by Juan Manuel Ramírez, Ieee Senior Member, Estado De Puebla, Centro Interdisciplinario De Postgrado, Filiberto López Larios, M. Sc. Student, México C. P
"... This paper describes a navigation system for an autonomous vehicle using machine vision techniques applied to real-time captured images of the track, for academic purposes. The experiment consists on the automatic navigation of a control remote car through a closed circuit. Computer vision technique ..."
Abstract - Add to MetaCart
This paper describes a navigation system for an autonomous vehicle using machine vision techniques applied to real-time captured images of the track, for academic purposes. The experiment consists on the automatic navigation of a control remote car through a closed circuit. Computer vision techniques are used for the sensing of the environment through a wireless camera. The received images are captured into the computer through the acquisition card NI USB-6009, and processed in a system developed under the LabView platform, taking advantage of the toolkit for acquisition and image processing. Fuzzy logic control techniques are incorporated for the intermediate control decisions required during the car navigation. An efficient approach based on logic machine-states is used as an optimal method to implement the changes required by the fuzzy logic control. Results and concluding remarks are presented. 1.

A Probabilistic Room Location Service for Wireless Networked Environments

by Paul Castro, Patrick Chiu, Ted Kremenek, Richard Muntz , 2001
"... The popularity of wireless networks has increased in recent years and is becoming a common addition to LANs. In this paper we investigate a novel use for a wireless network based on the IEEE 802.11 standard: inferring the location of a wireless client from signal quality measures. Similar work ha ..."
Abstract - Cited by 151 (2 self) - Add to MetaCart
The popularity of wireless networks has increased in recent years and is becoming a common addition to LANs. In this paper we investigate a novel use for a wireless network based on the IEEE 802.11 standard: inferring the location of a wireless client from signal quality measures. Similar work

Hybrid Rate Control for IEEE 802.11

by Ivaylo Haratcherev, Reginald Lagendijk, Koen Langendoen, Henk Sips - In Proceedings of ACM MobiWac , 2004
"... Streaming multimedia content in real-time over a wireless link is a challenging task because of the rapid fluctuations in link conditions that can occur due to movement, interference, and so on. The popular IEEE 802.11 standard includes low-level tuning parameters like the transmission rate. Standar ..."
Abstract - Cited by 12 (1 self) - Add to MetaCart
Streaming multimedia content in real-time over a wireless link is a challenging task because of the rapid fluctuations in link conditions that can occur due to movement, interference, and so on. The popular IEEE 802.11 standard includes low-level tuning parameters like the transmission rate

An Evaluation of Popular Copy-Move Forgery Detection Approaches."IEEE Transactions on Information Forensics and Security

by Vincent Christlein, Student Member, Christian Riess, Student Member, Johannes Jordan, Student Member, Corinna Riess, Elli Angelopoulou , 2012
"... Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works, must be ..."
Abstract - Cited by 16 (0 self) - Add to MetaCart
be obtained from the IEEE.
Next 10 →
Results 1 - 10 of 828
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University