Sciweavers

376 search results - page 72 / 76
» Blocking Vulnerable Paths of Wireless Sensor Networks
Sort
View
PERCOM
2003
ACM
15 years 9 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
IROS
2009
IEEE
136views Robotics» more  IROS 2009»
15 years 4 months ago
Integrating asynchronous observations for mobile robot position tracking in cooperative environments
— This paper presents an asynchronous particle filter algorithm for mobile robot position tracking, taking into account time considerations when integrating observations being d...
Andreu Corominas Murtra, Josep Maria Mirats i Tur,...
PERCOM
2007
ACM
15 years 9 months ago
Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and Correlated Mobility
Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real ...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
ICRA
2005
IEEE
217views Robotics» more  ICRA 2005»
15 years 3 months ago
Development of an Autonomous Mobile Surveillance System Using a Network-based RTK-GPS
- This paper describes an autonomous mobile surveillance system usually used in a factory premises with some high-rise buildings. This system consists of a wireless LAN network, a ...
Jun-ichi Meguro, Takumi Hashizume, Jun-ichi Takigu...
92
Voted
NOSSDAV
2009
Springer
15 years 4 months ago
Random network coding on the iPhone: fact or fiction?
In multi-hop wireless networks, random network coding represents the general design principle of transmitting random linear combinations of blocks in the same “batch” to downs...
Hassan Shojania, Baochun Li