Results 1 - 10
of
66
MoteTrack: A Robust, Decentralized Approach to RF-Based Location Tracking
, 2005
"... Abstract. In this paper, we present a robust, decentralized approach to RF-based location tracking. Our system, called MoteTrack, is based on low-power radio transceivers coupled with a modest amount of computation and storage capabilities. MoteTrack does not rely upon any back-end server or network ..."
Abstract
-
Cited by 170 (8 self)
- Add to MetaCart
or network infrastructure: the location of each mobile node is computed using a received radio signal strength signature from numerous beacon nodes to a database of signatures that is replicated across the beacon nodes themselves. This design allows the system to function despite significant failures
Received (Day Month Year)
, 2004
"... Communicated by (xxxxxxxxxx) In the Langevin or Ornstein-Uhlenbeck approach to diusion, stochastic increments are applied to the velocity rather than to the space variable. The density of this process satis es a linear partial dierential equation of the general form of a transport equation which is ..."
Abstract
- Add to MetaCart
is hyperbolic with respect to the space variable but parabolic with respect to the velocity variable, the Klein-Kramers or simply Kramers equation. This modeling approach allows for a more detailed description of individual movement and orientation dependent interaction than the frequently used reaction diusion
1Compressive Demodulation of Mutually Interfering Signals
"... Multi-User Detection is fundamental not only to cellular wireless communication but also to Radio-Frequency Identification (RFID) technology that supports supply chain management. The challenge of Multi-user Detection (MUD) is that of demodulating mutually interfering signals, and the two biggest im ..."
Abstract
- Add to MetaCart
Multi-User Detection is fundamental not only to cellular wireless communication but also to Radio-Frequency Identification (RFID) technology that supports supply chain management. The challenge of Multi-user Detection (MUD) is that of demodulating mutually interfering signals, and the two biggest
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC) On the Selection of Testbeds for the Evaluation of Sensor Network Protocols and Applications
"... Abstract—Wireless sensor network protocols and applications typically need to be evaluated and tested not only using simulators but also on testbeds. While simulations allow studying the performance of protocols and applications in a controlled environment, they usually do not provide a sufficient l ..."
Abstract
- Add to MetaCart
Abstract—Wireless sensor network protocols and applications typically need to be evaluated and tested not only using simulators but also on testbeds. While simulations allow studying the performance of protocols and applications in a controlled environment, they usually do not provide a sufficient
OF
, 2015
"... This Dissertation is brought to you for free and open access by DigitalCommons@URI. It has been accepted for inclusion in Open Access Dissertations ..."
Abstract
- Add to MetaCart
This Dissertation is brought to you for free and open access by DigitalCommons@URI. It has been accepted for inclusion in Open Access Dissertations
TriggerCast: Enabling Wireless Constructive Collisions
"... Abstract—Constructive Interference (CI) proposed in the ex-isting work (e.g., A-MAC [1], Glossy [2]) may degrade the packet reception performance in terms of Packet Reception Ratio (PRR) and Received Signal Strength Indication (RSSI). The packet reception performance of a set of nodes trans-mitting ..."
Abstract
- Add to MetaCart
Abstract—Constructive Interference (CI) proposed in the ex-isting work (e.g., A-MAC [1], Glossy [2]) may degrade the packet reception performance in terms of Packet Reception Ratio (PRR) and Received Signal Strength Indication (RSSI). The packet reception performance of a set of nodes trans
Suggested Associate Editorial Areas:
"... Detection and estimation Propagation and channel characterization In wireless communications, the relative strength of the direct and scattered components of the received signal, as expressed by the Ricean factor, provides an indication of link quality. Accordingly, efficient and accurate methods fo ..."
Abstract
- Add to MetaCart
Detection and estimation Propagation and channel characterization In wireless communications, the relative strength of the direct and scattered components of the received signal, as expressed by the Ricean factor, provides an indication of link quality. Accordingly, efficient and accurate methods
Copyright and use of this thesis
, 2013
"... This thesis must be used in accordance with the provisions of the Copyright Act 1968. Reproduction of material protected by copyright may be an infringement of copyright and copyright owners may be entitled to take legal action against persons who infringe their copyright. Section 51 (2) of the Copy ..."
Abstract
- Add to MetaCart
This thesis must be used in accordance with the provisions of the Copyright Act 1968. Reproduction of material protected by copyright may be an infringement of copyright and copyright owners may be entitled to take legal action against persons who infringe their copyright. Section 51 (2
Results 1 - 10
of
66