WiseMAC is a medium access control protocol designed for the WiseNETTMwireless sensor network. It is based on CSMA and uses the preamble sampling technique to minimize the power consumed when listening to an idle medium.
标签: WiseNETTMwireless designed protocol WiseMAC
上传时间: 2014-01-20
上传用户:x4587
Like many of my colleagues in this industry, I learned Windows programming from Charles Petzold s Programming Windows—a classic programming text that is the bible to an entire generation of Windows programmers. When I set out to become an MFC programmer in 1994, I went shopping for an MFC equivalent to Programming Windows. After searching in vain for such a book and spending a year learning MFC the old-fashioned way, I decided to write one myself. It s the book you hold in your hands. And it s the book I would like to have had when I was learning to program Windows the MFC way.
标签: programming colleagues industry Charles
上传时间: 2014-01-10
上传用户:曹云鹏
sba, a C/C++ package for generic sparse bundle adjustment is almost invariably used as the last step of every feature-based multiple view reconstruction vision algorithm to obtain optimal 3D structure and motion (i.e. camera matrix) parameter estimates. Provided with initial estimates, BA simultaneously refines motion and structure by minimizing the reprojection error between the observed and predicted image points.
标签: adjustment invariably package generic
上传时间: 2013-12-18
上传用户:xsnjzljj
Yet another mp3 player, but this time using SVGALib under Linux. The idea was to use a 320x240 display which can be used in a vehicle. I wrote this quite a few years ago, before mp3 players were so cheap. It uses mpg123 for the mp3 decoding.
标签: SVGALib 320x240 another player
上传时间: 2013-12-26
上传用户:zmy123
A simple program to connect to a postgres database. You ll need to alter the database settings for it to work.
标签: database postgres settings to
上传时间: 2013-12-28
上传用户:zhaoq123
A network chatroom,a a project of database ,is highlighted by my teacher,which using the newest technics,such as ajax,struts 2 and so on,i think is very good for freshmen in web application
标签: highlighted chatroom database network
上传时间: 2017-09-19
上传用户:Pzj
A decade ago, I first wrote that people moved, and networks needed to adapt to the reality that people worked on the go. Of course, in those days, wireless LANs came with a trade-off. Yes, you could use them while moving, but you had to trade a great deal of throughput to get the mobility. Although it was possible to get bits anywhere, even while in motion, those bits came slower. As one of the network engineers I worked with put it, “We’ve installed switched gigabit Ethernet everywhere on campus, so I don’t understand why you’d want to go back to what is a 25-megabit hub.” He un- derestimated the allure of working on the go.
上传时间: 2020-05-26
上传用户:shancjb
Without conceding a blemish in the first edition, I think I had best come clean and admit that I embarked on a second edition largely to adopt a more geometric approach to the detection of signals in white Gaussian noise. Equally rigorous, yet more intuitive, this approach is not only student-friendly, but also extends more easily to the detection problem with random parameters and to the radar problem
标签: Communication Foundation Digital in
上传时间: 2020-05-26
上传用户:shancjb
Part I provides a compact survey on classical stochastic geometry models. The basic models defined in this part will be used and extended throughout the whole monograph, and in particular to SINR based models. Note however that these classical stochastic models can be used in a variety of contexts which go far beyond the modeling of wireless networks. Chapter 1 reviews the definition and basic properties of Poisson point processes in Euclidean space. We review key operations on Poisson point processes (thinning, superposition, displacement) as well as key formulas like Campbell’s formula. Chapter 2 is focused on properties of the spatial shot-noise process: its continuity properties, its Laplace transform, its moments etc. Both additive and max shot-noise processes are studied. Chapter 3 bears on coverage processes, and in particular on the Boolean model. Its basic coverage characteristics are reviewed. We also give a brief account of its percolation properties. Chapter 4 studies random tessellations; the main focus is on Poisson–Voronoi tessellations and cells. We also discuss various random objects associated with bivariate point processes such as the set of points of the first point process that fall in a Voronoi cell w.r.t. the second point process.
标签: Stochastic Geometry Networks Wireless Volume and
上传时间: 2020-06-01
上传用户:shancjb
Having dealt with in-depth analysis of SS#7, GSM and GPRS networks I started to monitor UTRAN interfaces approximately four years ago. Monitoring interfaces means decoding the data captured on the links and analysing how the different data segments and messages are related to each other. In general I wanted to trace all messages belonging to a single call to prove if the network elements and protocol entities involved worked fine or if there had been failures or if any kind of suspicious events had influenced the normal call proceeding or the call’s quality of service. Cases showing normal network behaviour have been documented in Kreher and Ruedebusch (UMTS Signaling. John Wiley & Sons, Ltd, 2005), which provides examples for technical experts investigating call flows and network procedures.
标签: Performance Measurement Practical Guide UMTS
上传时间: 2020-06-01
上传用户:shancjb