Sciweavers

614 search results - page 91 / 123
» A Distributed boundary detection algorithm for multi-robot s...
Sort
View
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 4 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
SENSYS
2010
ACM
14 years 7 months ago
AutoWitness: locating and tracking stolen property while tolerating GPS and radio outages
We present AutoWitness, a system to deter, detect, and track personal property theft, improve historically dismal stolen property recovery rates, and disrupt stolen property distr...
Santanu Guha, Kurt Plarre, Daniel Lissner, Somnath...
CN
2007
224views more  CN 2007»
14 years 9 months ago
Automated adaptive intrusion containment in systems of interacting services
Large scale distributed systems typically have interactions among different services that create an avenue for propagation of a failure from one service to another. The failures ...
Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagc...
IPPS
2007
IEEE
15 years 4 months ago
Optimal Assignment of a Tree-Structured Context Reasoning Procedure onto a Host-Satellites System
In this paper, we study the problem of an optimal assignment of a tree-structured context reasoning procedure onto the computation resources in a hostsatellites configuration. The...
Hailiang Mei, Pravin Pawar, Ing Widya
PERCOM
2003
ACM
15 years 9 months ago
Energy-Aware Target Localization in Wireless Sensor Networks
Wireless distributed sensor networks (DSNs) are important for a number of strategic applications such as coordinated target detection, surveillance, and localization. Energy is a ...
Yi Zou, Krishnendu Chakrabarty