Search For:

Displaying 1-50 out of 2,344 total
Ji-Young Kim
Found in: Proceedings of the conference on ACM SIGGRAPH 05 electronic art and animation catalog (GRAPH '05)
By Ji-Young Kim
Issue Date:August 2005
pp. 92-93
The 2005 SIGGRAPH jury was more than a chance to survey the digital art scene with a roomful of passionate but collegial comrades. It was also an opportunity to reflect on the role, for better or worse, that technology is playing in the production and exhi...
Evaluating Protein Similarity from Coarse Structures
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Chen Luonan, Ji-Hong Zhang, Ji-Hong Zhang, Ji-Hong Zhang, Wu Ling-Yun, Wu Ling-Yun, Wu Ling-Yun, Yong Wang, Yong Wang, Yong Wang, Zhang Xiang-Sun, Zhang Xiang-Sun, Zhang Xiang-Sun, Zhong-Wei Zhan, Zhong-Wei Zhan, Zhong-Wei Zhan
Issue Date:October 2009
pp. 583-593
To unscramble the relationship between protein function and protein structure, it is essential to assess the protein similarity from different aspects. Although many methods have been proposed for protein structure alignment or comparison, alternative simi...
A Weighted Clustering Algorithm Based Routing Protocol in Wireless Sensor Networks
Found in: Computing, Communication, Control and Management, ISECS International Colloquium on
By Zhang Jian-wu, Ji Ying-ying, Zhang Ji-ji, Yu Cheng-lei
Issue Date:August 2008
pp. 599-602
The wireless sensor network is a type of the wireless ad-hoc networks. It is composed of nodes with limited battery power. One of the most critical issues in designing wireless sensor networks is to minimize the energy consumption for longevity. In this pa...
Cylinder Detection in Large-Scale Point Cloud of Pipeline Plant
Found in: IEEE Transactions on Visualization and Computer Graphics
By Yong-Jin Liu, Jun-Bin Zhang, Ji-Chun Hou, Ji-Cheng Ren, Wei-Qing Tang
Issue Date:October 2013
pp. 1700-1707
The huge number of points scanned from pipeline plants make the plant reconstruction very difficult. Traditional cylinder detection methods cannot be applied directly due to the high computational complexity. In this paper, we explore the structural charac...
Emotional Image Processing Using Sensors in Mobile Device
Found in: 2013 International Conference on Information Science and Applications (ICISA)
By Jong-Jin Jung,Sukmin Kwon,Ji-Hoon Kim,Ji-Yeon Kim
Issue Date:June 2013
pp. 1-3
The embedded sensors are often used to stand out the features of mobile devices. Especially several sensors have roles of interface between user and device. In this paper, we propose an emotional user interface model using sensors in image processing. We d...
Removal of Aromatic Compounds from Wastewater by Biodiesel
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Fengwen Yu,Dengxiang Ji,Jianbing Ji
Issue Date:March 2012
pp. 528-531
Wastewater from chemical plant, refinery and pharmaceutical factory contains many kinds of aromatic compounds. Wastewater including aromatic compounds is hazardous and difficult to be biodegraded. This study concerned the method of extracting aromatic comp...
Mining flickr landmarks by modeling reconstruction sparsity
Found in: ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
By Bineng Zhong, Hongxun Yao, Hongxun Yao, Qi Tian, Qi Tian, Rongrong Ji, Rongrong Ji, Yue Gao, Yue Gao
Issue Date:October 2011
pp. 1-22
In recent years, there have been ever-growing geographical tagged photos on the community Web sites such as Flickr. Discovering touristic landmarks from these photos can help us to make better sense of our visual world. In this article, we report our work ...
MoveMine: Mining moving object data for discovery of animal movement patterns
Found in: ACM Transactions on Intelligent Systems and Technology (TIST)
By Bolin Ding, Jae-Gil Lee, Jae-Gil Lee, Jiawei Han, Jiawei Han, Lu-An Tang, Lu-An Tang, Ming Ji, Ming Ji, Roland Kays, Roland Kays, Yintao Yu, Yintao Yu, Zhenhui Li, Zhenhui Li
Issue Date:July 2011
pp. 1-32
With the maturity and wide availability of GPS, wireless, telecommunication, and Web technologies, massive amounts of object movement data have been collected from various moving object targets, such as animals, mobile devices, vehicles, and climate radars...
Design of Detection System for Complex Artillery Weapon Communication System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Fengrong Ji,Yaqing Xu,Lei Ji
Issue Date:March 2011
pp. 411-414
The maintenance and technical support for complex artillery weapon communication system is very difficult in the army. In order to solve this problem, the paper designed a detection system for communication system, and provided a detection method which com...
Research on Speciation and Bioavailability of Arsenic in Soil
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Wang Jin-cui, Sun Ji-chao, Jing Ji-hong, Zhang Yu-xi, Liu Jing-tao, Zhang Ying, Chen Xi, Xiang Xiao-ping, Huang Guan-xing, Zhang Yuan-jing
Issue Date:February 2011
pp. 2486-2489
Progresses in the study of speciation and biological uptake of arsenic in soil are introduced. The researches on bioavailability of arsenic are summarized, and the main factors which affect arsenic bioavailability are emphatically discussed. Relationship b...
Study on Measurement Model for Forest Risk Assessment in Beijing
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Zhang Ying, Yi Ai-jun, Ji Jian-wei, Lu Ji
Issue Date:February 2011
pp. 1750-1755
It has an important significance to promote the Beijing forestry development and strengthen forest resources management for study on Beijing forest measurement model of risk assessment. This paper has studied on forest measurement model of risk assessment ...
Prediction Study on Lateral Acceleration of Railway Coach Based on RBF Neural Networks
Found in: Intelligent Systems, WRI Global Congress on
By Li-jun Yang, Ji-min Zhang, Ji-tong Zhang
Issue Date:December 2010
pp. 189-192
The lateral acceleration of railway coach is chaotic time series with certain law when it passes the curve. The passing curve unbalanced acceleration can be predicted with the law and the experiment data in certain time. And the predicted values can be use...
An Improved LIEP Method Utilizing Electrothermal Technology
Found in: Optoelectronics and Image Processing, International Conference on
By Qiaoling Ji, Yi Jiang, Xiaowei Ji
Issue Date:November 2010
pp. 217-220
Laser Induced Electroless Plating(LIEP) has many advantages such as homogeneous microstructure, relatively low cost, feasibility to be applied on non-metal substrates and operated at room temperature with relative simple equipment, and thus received much a...
The Security and Promotion Method of Transport Layer of TCP/IP Agreement
Found in: Information Technology and Computer Science, International Conference on
By Wang Hao-yu, Cao Hui-zhi, Zhu Xu, Ji Chao-jun, Ji Xiao-juan
Issue Date:July 2010
pp. 513-517
For TCP/IP Agreement has certain security bugs, the hacker catches the opportunity to attack the Network. On the basis of the analysis of the TCP/IP Agreement's vulnerability, the article has further analyzed the vulnerability of the Transport Layer Agreem...
Optimal Maintenance Decision of Power Transformers
Found in: Electrical and Control Engineering, International Conference on
By Hong-xia Ji, Ji-quan Zhang, Zhen-yong Liu, Gui-shu Liang, Hong-shan Zhao
Issue Date:June 2010
pp. 3941-3944
This paper introduced the concept of Proportional Hazards Model (PHM), it took advantage of the Weibull PHM to establish the failure rate model of transformer maintenance based on condition monitoring information. The failure rate threshold through the max...
A framework for modeling 3D scenes using pose-free equations
Found in: ACM Transactions on Graphics (TOG)
By Daniel G. Aliaga, Ji Zhang, Ji Zhang, Mireille Boutin, Mireille Boutin
Issue Date:December 2009
pp. 1-15
Many applications in computer graphics require detailed 3D digital models of real-world environments. The automatic and semi-automatic modeling of such spaces presents several fundamental challenges. In this work, we present an easy and robust camera-based...
A Reference Model of Cloud Operating and Open Source Software Implementation Mapping
Found in: Enabling Technologies, IEEE International Workshops on
By Wenke Ji, Jiangbo Ma, Xiaoyong Ji
Issue Date:July 2009
pp. 63-65
In this article, a reference model is proposed. The model divides the cloud computing system with various components in a 3-layer hierarchy called infrastructure, platform and application. The details of the components are presented for its functionality a...
Effect of Asparagus Polysaccharides on Migration Time of Erythrocytes in Tumor-Bearing Organisms Using High Performance Capillary Electrophoresis
Found in: Future BioMedical Information Engineering, International Seminar on
By Chen-Feng Ji, Yu-Bin Ji, Xiang Zou
Issue Date:December 2008
pp. 199-201
This study analyzed the effect of Asparagus polysaccharides on the migration time of erythrocytes in tumor-bearing organisms. A mouse tumor model was developed in which mice were intraperitoneally injected with high, medium, and low dosages of Asparagus po...
Determination and Analysis of Toluene Diisocyanate Metabolites in Mice Using Gas Chromatography-Mass Spectrometry
Found in: Future BioMedical Information Engineering, International Seminar on
By Yubin Ji, Chenfeng Ji, Xiang Zou, Lei Yu, Lang Lang
Issue Date:December 2008
pp. 216-219
This paper is to To determine metabolites of toluene diisocyanate (TDI) in mice and deduced the pathway for toluene diisocyanate metabolism in the organism. Toluene diisocyanate was administered to mice for 2 weeks, samples of blood, feces, and urine were ...
The Effect of Solanine on the Membrane Potential of Mitochondria in HepG2 Cells and [Ca^2+]i in the Cells
Found in: Future BioMedical Information Engineering, International Seminar on
By Yu-Bin Ji, Shi-yong Gao, Chen-Feng Ji, Xiang Zou, Lei Yu
Issue Date:December 2008
pp. 329-332
To observe the effect of solanine on the membrane potential of mitochondria in HepG2 cells and [Ca2+]i in the cells, and to uncover the mechanism by which solanine induces apoptosis. HepG2 cells are double stained with TMRE and Fluo-3/AM, and both the chan...
Study on the Apoptosis Effect Induced by Isothiocyanates in Broccoli on Human Gastric Adenoma Cells (SGC-7901)
Found in: Future BioMedical Information Engineering, International Seminar on
By Xiang Zou, Yu-Bin Ji, Chen-Feng Ji, Lei Yu, Lang Lang
Issue Date:December 2008
pp. 333-335
To investigate the pro-apoptosis effect of isothiocyanates(ITCS) on human gastric adenoma cells SGC-7901 and its mechanism. METHODS: SGC-7901 was treated with different concentrations of ITCS. MTT assay was used to evaluate the influence of ITCS on cell pr...
Calculation of the Effect of Solanine on the Michaelis Constant and the Maximum Reaction Rate of NAT
Found in: Future BioMedical Information Engineering, International Seminar on
By Yu-bin Ji, Shi-yong Gao, Xiang Zou, Chen-feng Ji
Issue Date:December 2008
pp. 220-222
To explore how to calculate the effect of solanine on the Michaelis constant and the maximum reaction rate of NAT, High performance liquid chromatography (HPLC) was used, with 2-AF as substrate, and the rate at which 2-AF is acetylated into 2-AAF in intact...
Improvement of I2C Bus and RS-232 Serial Port under Complex Electromagnetic Environment
Found in: Computer Science and Software Engineering, International Conference on
By Yan-Jie Chai,Ji-Yin Sun,Jing Gao,Ling-Jiao Tao,Jing Ji,Fei-Hu Bao
Issue Date:December 2008
pp. 178-181
I2C bus and RS-232 serial port are the important data communication interfaces between the MCU of embedded system and the peripheral equipment. The embedded system performance will be affected under complex electromagnetic environment by the improper dispo...
Systematic Website Verification for Privacy Protection
Found in: Information Assurance and Security, International Symposium on
By Ji-Hee Jeoung, Eun-Ji Shin, Seng-Phil Hong, Sung-Hoon Kim, In-Ho Kim, Min-Woo Lee
Issue Date:September 2008
pp. 231-234
The Internet is now a prime vehicle for business, community, and personal interactions. The privacy of individuals sensitive information has become a major concern of consumers who use the Web to purchase goods or obtain services in web-based computing env...
A Probabilistic Approach to Resource Allocation in Distributed Fusion Systems
Found in: International Conference on Information Acquisition
By Ren Ji-Xu, Song Jia-Cheng, Hai Ji-Liu, Feng Xiao-Yu
Issue Date:August 2006
pp. 578-583
In complex multi-agent fusion systems resource conflicts are very likely to occur. We propose an algorithm that determines the optimal sensing resource to fusion task assignment, based on the entropy change criterion. By exploiting the Bayesian network fra...
Multi-sensor Fuzzy Stochastic Fusion Based on Genetic Algorithms
Found in: International Conference on Information Acquisition
By Ren Ji-Xu, Song Jia-Cheng, Hai Ji-Liu, Feng Xiao-Yu
Issue Date:August 2006
pp. 589-594
To establish a parallel fusion approach of processing high dimensional information, the model and criterion of multi-sensor fuzzy stochastic data fusion were presented. In order to design genetic algorithm fusion 1 the fusion parameter coding) initial popu...
Automated WCET analysis based on program modes
Found in: Proceedings of the 2006 international workshop on Automation of software test (AST '06)
By Ji Wang, Meng-Luo Ji, Shuhao Li, Zhi-Chang Qi
Issue Date:May 2006
pp. 36-42
Program mode is a regular trajectory of the execution of a program that is determined by the values of its input variables. By exploiting program modes we may make Worst Case Execution Time (WCET) analysis more precise. This paper presents a novel method t...
Octree-R: An Adaptive Octree for Efficient Ray Tracing
Found in: IEEE Transactions on Visualization and Computer Graphics
By Kyu-Young Whang, Ju-Won Song, Ji-Woong Chang, Ji-Yun Kim, Wan-Sup Cho, Chong-Mok Park, Il-Yeol Song
Issue Date:December 1995
pp. 343-349
<p><it>Abstract</it>—Ray tracing requires many ray-obect intersection tests. A way of reducing the number of ray-object intersection tests is to subdivide the space occupied by objects into many non-overlapping subregions, called <it&g...
Robust Digital Watermarking Adopting Barcode in Image
Found in: Information Science and Engineering, International Conference on
By Hui-qin Wang, Fei Shang, Qi-chun Ji, Ji-chao Hao
Issue Date:December 2009
pp. 660-662
A new barcode watermarking algorithm in Discrete Wavelet Transform (DWT) domain is proposed. The algorithm utilizes the visual masking and texture characteristics of Human Visual System (HVS) to achieve the invisible and robust requirements for watermarkin...
Fault-Tolerant Scheduling for Real-Time Tasks on Multiple Earth-Observation Satellites
Found in: IEEE Transactions on Parallel and Distributed Systems
By Xiaomin Zhu,Jianjiang Wang,Xiao Qin,Ji Wang,Zhong Liu,Erik Demeulemeester
Issue Date:February 2015
pp. 1
Fault-tolerance plays an important role in improving the reliability of multiple earth-observing satellites, especially in emergent scenarios such as obtaining photographs on battlefields or earthquake areas. Fault tolerance can be implemented through sche...
Profit Improvement in Wireless Video Broadcasting System: A Marginal Principle Approach
Found in: IEEE Transactions on Mobile Computing
By Wen Ji,Bo-Wei Chen,yiqiang chen,Sun-Yuan Kung
Issue Date:February 2015
pp. 1
In this paper, we address the problem of how to make the wireless service provider have better profits with consideration of user experience provision in wireless video broadcasting systems. We propose a marginal-based pricing and a resource-allocation fra...
Multi-user Computation Partitioning for Latency Sensitive Mobile Cloud Applications
Found in: IEEE Transactions on Computers
By Lei Yang,Jiannong Cao,Hui Cheng,Yusheng Ji
Issue Date:February 2015
pp. 1
Elastic partitioning of computations between mobile devices and cloud is an important and challenging research topic for mobile cloud computing. Existing works focus on the single-user computation partitioning, which aims to optimize the application comple...
Incorporating Social Role into Topic Models for Social Media Content Analysis
Found in: IEEE Transactions on Knowledge and Data Engineering
By Xin Zhao,Jinpeng Wang,Jian-Yun Nie,Yulan He,Ji-Rong Wen,Xiaoming LI
Issue Date:February 2015
pp. 1
In this paper, we explore the idea of Social Role Theory (SRT) and propose a novel regularized topic model which incorporates SRT into the generative process of social media content. We assume that a user can play multiple social roles, and each social rol...
A Framework of Joint Mobile Energy Replenishment and Data Gathering in Wireless Rechargeable Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Miao Zhao,Ji Li,Yuanyuan Yang
Issue Date:December 2014
pp. 2689-2705
Recent years have witnessed the rapid development and proliferation of techniques on improving energy efficiency for wireless s`ensor networks. Although these techniques can relieve the energy constraint on wireless sensors to some extent, the lifetime of ...
Rapid Assessment of Adverse Drug Reactions by Statistical Solution of Gene Association Network
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Yan-Ping Xiang,Ke Liu,Xian-Ying Cheng,Cheng Cheng,Fang Gong,Jian-Bo Pan,Zhi-Liang Ji
Issue Date:August 2014
pp. 1
Adverse drug reaction (ADR) is a common clinical problem, sometimes accompanying with high risk of mortality, morbidity and hospitalization rates. It is also one of the major factors that lead to failure in new drug development. Unfortunately, most of curr...
Distributed and Asynchronous Data Collection in Cognitive Radio Networks with Fairness Consideration
Found in: IEEE Transactions on Parallel and Distributed Systems
By Zhipeng Cai,Shouling Ji,Jing He,Lin Wei,Anu G. Bourgeois
Issue Date:August 2014
pp. 2020-2029
As a promising communication paradigm, Cognitive Radio Networks (CRNs) have paved a road for Secondary Users (SUs) to opportunistically exploit unused licensed spectrum without causing unacceptable interference to Primary Users (PUs). In this paper, we stu...
Current Electronic Medical Record in China
Found in: 2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)
By Chen Shi,Liu Hui-Ting,Pan Hui,Ji-Jiang Yang,Jianqiang Li,Qing Wang
Issue Date:July 2014
pp. 668-672
It is widely accepted that the high quality healthcare services lie in the effectiveness and efficiency of health problem detection, innovative solution identification, and medical resource allocation, which in turn depend heavily on the proper collection,...
Using Knowledge Management and Mhealth in High-Risk Pregnancy Care: A Case for the Floating Population in China
Found in: 2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)
By Ben-Da Gu,Ji-Jiang Yang,Jian-Qiang Li,Qing Wang,Yu Niu
Issue Date:July 2014
pp. 678-683
Some disorders and conditions can put a mother or baby at a higher risk for problems, which requires management by a specialist to help ensure the best outcome of the pregnancy. But it is a big challenge in the case of the rural women in urban China, consi...
Large-Scale Geosocial Multimedia [Guest editorial]
Found in: IEEE MultiMedia
By Rongrong Ji,Yi Yang,Nicu Sebe,Kiyoharu Aizawa,Liangliang Cao
Issue Date:July 2014
pp. 7-9
With the advance of the Web 2.0 era came an explosive growth of geographical multimedia data shared on social network websites such as Flickr, YouTube, Facebook, and Zooomr. Location-aware media description, modeling, learning, and recommendation in pervas...
Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jing He,Shouling Ji,Yi Pan,Yingshu Li
Issue Date:July 2014
pp. 1681-1690
Data Gathering is a fundamental task in Wireless Sensor Networks (WSNs). Data gathering trees capable of performing aggregation operations are also referred to as Data Aggregation Trees (DATs). Currently, most of the existing works focus on constructing DA...
A Hierarchical Context Model for Event Recognition in Surveillance Video
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Xiaoyang Wang,Qiang Ji
Issue Date:June 2014
pp. 2561-2568
Due to great challenges such as tremendous intra-class variations and low image resolution, context information has been playing a more and more important role for accurate and robust event recognition in surveillance videos. The context information can ge...
A Hierarchical Probabilistic Model for Facial Feature Detection
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Yue Wu,Ziheng Wang,Qiang Ji
Issue Date:June 2014
pp. 1781-1788
Facial feature detection from facial images has attracted great attention in the field of computer vision. It is a nontrivial task since the appearance and shape of the face tend to change under different conditions. In this paper, we propose a hierarchica...
Image Pre-compensation: Balancing Contrast and Ringing
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Yu Ji,Jinwei Ye,Sing Bing Kang,Jingyi Yu
Issue Date:June 2014
pp. 3350-3357
The goal of image pre-compensation is to process an image such that after being convolved with a known kernel, will appear close to the sharp reference image. In a practical setting, the pre-compensated image has significantly higher dynamic range than the...
Complex Activity Recognition Using Granger Constrained DBN (GCDBN) in Sports and Surveillance Video
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Eran Swears,Anthony Hoogs,Qiang Ji,Kim Boyer
Issue Date:June 2014
pp. 788-795
Modeling interactions of multiple co-occurring objects in a complex activity is becoming increasingly popular in the video domain. The Dynamic Bayesian Network (DBN) has been applied to this problem in the past due to its natural ability to statistically c...
L0 Norm Based Dictionary Learning by Proximal Methods with Global Convergence
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Chenglong Bao,Hui Ji,Yuhui Quan,Zuowei Shen
Issue Date:June 2014
pp. 3858-3865
Sparse coding and dictionary learning have seen their applications in many vision tasks, which usually is formulated as a non-convex optimization problem. Many iterative methods have been proposed to tackle such an optimization problem. However, it remains...
Saliency Detection on Light Field
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Nianyi Li,Jinwei Ye,Yu Ji,Haibin Ling,Jingyi Yu
Issue Date:June 2014
pp. 2806-2813
Existing saliency detection approaches use images as inputs and are sensitive to foreground/background similarities, complex background textures, and occlusions. We explore the problem of using light fields as input for saliency detection. Our technique is...
Hard Drive Failure Prediction Using Classification and Regression Trees
Found in: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Jing Li,Xinpu Ji,Yuhan Jia,Bingpeng Zhu,Gang Wang,Zhongwei Li,Xiaoguang Liu
Issue Date:June 2014
pp. 383-394
Some statistical and machine learning methods have been proposed to build hard drive prediction models based on the SMART attributes, and have achieved good prediction performance. However, these models were not evaluated in the way as they are used in rea...
Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors
Found in: 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA)
By Yoongu Kim,Ross Daly,Jeremie Kim,Chris Fallin,Ji Hye Lee,Donghyuk Lee,Chris Wilkerson,Konrad Lai,Onur Mutlu
Issue Date:June 2014
pp. 361-372
Memory isolation is a key property of a reliable and secure computing system—an access to one memory address should not have unintended side effects on data stored in other addresses. However, as DRAM process technology scales down to smaller dimensions, i...
Music Emotion Classification Based on Music Highlight Detection
Found in: 2014 International Conference on Information Science and Applications (ICISA)
By Jun-Yong Lee,Ji-Yeon Kim,Hyoung-Gook Kim
Issue Date:May 2014
pp. 1-2
This paper presents a music emotion classification based on music highlight detection. To find a highlight segment of songs, we use only energy information based on ormalized MDCT coefficients of audio streams. With daBoost algorithm, the proposed tempo fe...
Joint MAC and Network Layer Control for VANET Broadcast Communications Considering End-to-End Latency
Found in: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA)
By Celimuge Wu,Satoshi Ohzahata,Yusheng Ji,Toshihiko Kato
Issue Date:May 2014
pp. 689-696
In vehicular ad hoc networks (VANETs), multi-hop broadcast communications are required for many applications including driver assistance systems. However, providing a low end-to-end latency has been very challenging. In this paper, we propose a joint MAC n...
 1  2 Next >>