Abstract We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible ...
It is due to the modularity they provide that results for cascaded systems have proved their utility in numerous control applications as well as in the development of general cont...
In this paper, energy-based localization methods for source localization in sensor networks are examined. The focus is on least-squares-based approaches due to a good tradeoff betw...
—The increasingly complex roles for which Wireless Sensor Networks (WSNs) are being employed have driven the desire for energy-efficient reliable target tracking. In this paper, ...
Bidirectional transformation is a pair of transformations: a view function and a backward transformation. A view function maps one data structure called source onto another called...