All Media Types
Widar2.0: passive human tracking with a single Wi-Fi link
Qian K., Wu C., Zhang Y., Zhang G., Yang Z., Liu Y. MobiSys 2018 (Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, Munich, Germany, Jun 10-15, 2018) 350-361, 2018. Type: Proceedings
This work demonstrates that it is possible to track the location of a person, with sub-meter accuracy, using only one single Wi-Fi link between a pair of commercial off-the-shelf (COTS) Wi-Fi devices (“one access point plus one client”...
Jun 22 2021
Research on LRU optimal division method considering comprehensive cost of development and maintenance
Ge Z., Jiang S., luo X., Qi Z., Yang Y., Zhang Y. CSAE 2019 (Proceedings of the 3rd International Conference on Computer Science and Application Engineering, Sanya, China, Oct 22-24, 2019) 1-7, 2019. Type: Proceedings
Efforts can be made to reduce life cycle costs and improve equipment availability. This is not only an issue of (company) low-maintenance costs and high availability, but can also be a big challenge “under battlefield conditions.” One ...
Jan 17 2020
Security bootstrap model of key pre-sharing by polynomial group in mobile ad hoc network
Feng L., Li Z., Zhang Y. Journal of Network and Computer Applications 32(4): 781-787, 2009. Type: Article
This paper exploits the (
) threshold scheme of polynomials and one-way hash functions to secure the bootstrap of ad hoc networks. Feng, Li, and Zhang apply the group-oriented cryptosystem on ad hoc network...
Aug 17 2009
Minority games: interacting agents in financial markets (Oxford Finance Series)
Challet D., Marsili M., Zhang Y., Oxford University Press, Inc., New York, NY, 2005. 360 pp. Type: Book (9780198566403)
Progress in science often depends on the availability of abstract models of the real world. For example:...
Jul 6 2006
Execution history guided instruction prefetching
Zhang Y., Haga S., Barua R. The Journal of Supercomputing 27(2): 129-147, 2004. Type: Article
Zhang, Haga, and Barua propose a new hardware-based I-cache correlated prefetch algorithm called “execution guided history method.” Their main idea is to correlate cache misses to instructions executed in a delta-time prior to the miss...
Aug 6 2004
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2021 ThinkLoud, Inc.