Tom Celinski, PhD

Tom Celinski, PhD

Greater Sydney Area
9K followers 500+ connections

About

Let's get it done!

I get things done, complex things, big things, often crazy hard…

Articles by Tom

Activity

Join now to see all activity

Experience

  • Nearmap Graphic

    Nearmap

    Sydney, Australia

  • -

    Sydney, Australia

  • -

    Sydney, Australia

  • -

    Sydney, Australia

  • -

  • -

  • -

  • -

  • -

Education

  • The Australian National University Graphic

    The Australian National University

    -

    Activities and Societies: ANU Jujutsu Club

    • Accepted for post-graduate study at Oxford University, UK
    • Chose to stay at ANU to study under Brenan McCarragher (ex-MIT)
    • Published 11 peer-reviewed papers
    • Presented at a number of leading international conferences.

  • -

  • -

    First person ever to be admitted to the ANU Distinguished Scholars Program in Computer Science (mentored by Prof. Richard Brent)

Publications

  • Learning and adaptation of sensory perception models in robotic systems

    Proceedings of the 2000 IEEE International Conference on Robotics and Automation

    Other authors
    • Brenan McCarragher
  • Achieving efficient data fusion through integration of sensory perception control and sensor fusion

    Proceedings of the1999 IEEE International Conference on Robotics and Automation

    Other authors
    • Brenan McCarragher
  • Determining the value of monitoring for dynamic monitor selection

    Proceedings of the 1998 IEEE International Conference on Robotics and Automation

    Other authors
    • Brenan McCarragher
  • An adaptive sensory perception controller for robotic systems

    Proceedings of the 2000 IEEE International Conference on Robotics and Automation

    Other authors
    • Brenan McCarragher

Patents

  • Cameras and networked security systems and methods

    US WO 2014144628 A3

    A system includes a remote server and a device having a wireless transceiver, microphone, and processing circuit. The processing circuit is configured to monitor the microphone for a siren signature. The processing circuit is configured to use the wireless transceiver to send information to the remote server in response to a detection of the siren signature. The remote server causes wireless cameras located near the device to capture a current image and to send the captured image to the remote…

    A system includes a remote server and a device having a wireless transceiver, microphone, and processing circuit. The processing circuit is configured to monitor the microphone for a siren signature. The processing circuit is configured to use the wireless transceiver to send information to the remote server in response to a detection of the siren signature. The remote server causes wireless cameras located near the device to capture a current image and to send the captured image to the remote server for further distribution.

  • Media data synchronization in a wireless network

    US US 7539889 B2

    A method of keeping global time in a wireless network, the method includes reading a Time Synchronization Function (TSF) to provide an initial time base. An interconnected clock control circuit is employed to read the TSF time from the circuitry used to read the TSF and to implement a local clock based on time values read from the TSF.

  • Media data transfer in a network environment

    US US 8462627 B2

    In a wireless network environment, a method of transmitting data from a source device to a set of sink devices, the method comprising the steps of: (a) initially the source device broadcasting packet data collectively to each of the sink devices; (b) the sink devices collecting packet data and identifying missing packets that have been missed; (c) upon a sink device detecting a missed a packet, the sink device separately requesting the transmission of the missed packet by the source device; and…

    In a wireless network environment, a method of transmitting data from a source device to a set of sink devices, the method comprising the steps of: (a) initially the source device broadcasting packet data collectively to each of the sink devices; (b) the sink devices collecting packet data and identifying missing packets that have been missed; (c) upon a sink device detecting a missed a packet, the sink device separately requesting the transmission of the missed packet by the source device; and (d) the source device separately sending missed data packets.

  • Networked security system

    US US 20160105847 A1

    A method of communicating between a wireless security device and a security server through an access point includes estimating a link latency between a time of transmission of a message from the wireless security device and a time at which a response is received from the security server. A polling mode is enabled in which the access point will hold messages received by the access point that are directed to the wireless security device while the device is in a sleep state, without discarding the…

    A method of communicating between a wireless security device and a security server through an access point includes estimating a link latency between a time of transmission of a message from the wireless security device and a time at which a response is received from the security server. A polling mode is enabled in which the access point will hold messages received by the access point that are directed to the wireless security device while the device is in a sleep state, without discarding the messages for a threshold period of time. The wireless security device may be placed in a sleep state and woken after a wake time determined based on the estimated link latency, and receives any messages received by the access point during the sleep state.

  • Networked security system

    US WO 2014144601 A1

    A method of securing communications between a security device and a security server include receiving, at the security server, a registration request from the security device, the registration request being encrypted using an initial registration key. A device identifier and rotation key unique to the security device are transmitted to the security device. A first session key request is received at the security server from the security device, the request being encrypted using the rotation key.…

    A method of securing communications between a security device and a security server include receiving, at the security server, a registration request from the security device, the registration request being encrypted using an initial registration key. A device identifier and rotation key unique to the security device are transmitted to the security device. A first session key request is received at the security server from the security device, the request being encrypted using the rotation key. A first session key is transmitted to the security device in response. One or more communications, encrypted using the first session key, is received at the security server from the security device. A second session key request is received at the security server from the security device after the first session key has expired, the request encrypted using the rotation key. A second session key is transmitted to the security device in response.

  • Systems and methods for configuration of wireless camera

    US 20160105406

    Systems and methods for configuring a wireless camera to connect to a wireless access point are provided. The systems and methods include wirelessly connecting to a client device and transmitting an encryption key to the client device. The systems and methods also include receiving encrypted data from the client device and decrypting the data using the encryption key. The encrypted data may include an identifier and an access code. The systems and methods further include wirelessly connecting…

    Systems and methods for configuring a wireless camera to connect to a wireless access point are provided. The systems and methods include wirelessly connecting to a client device and transmitting an encryption key to the client device. The systems and methods also include receiving encrypted data from the client device and decrypting the data using the encryption key. The encrypted data may include an identifier and an access code. The systems and methods further include wirelessly connecting to the wireless access point using the decrypted data.

  • Unification of multimedia devices

    US US 7987294 B2

    Described herein are various methods and systems relating to the unification of media devices, and more specifically to the provision of wireless audio systems. In overview, two or more wireless speaker subsystem units substantially autonomously form a single wireless audio system having its own control interface. This control interface is used to apply operational changes across the wireless audio system, such as volume adjustment. That is, an operational change may be applied to the system as…

    Described herein are various methods and systems relating to the unification of media devices, and more specifically to the provision of wireless audio systems. In overview, two or more wireless speaker subsystem units substantially autonomously form a single wireless audio system having its own control interface. This control interface is used to apply operational changes across the wireless audio system, such as volume adjustment. That is, an operational change may be applied to the system as a whole, and this change is subsequently implemented by each of the individual wireless speaker subsystem units.

Languages

  • English

    Native or bilingual proficiency

  • Polish

    Native or bilingual proficiency

  • German

    Elementary proficiency

Recommendations received

16 people have recommended Tom

Join now to view

More activity by Tom

View Tom’s full profile

  • See who you know in common
  • Get introduced
  • Contact Tom directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses