Sciweavers

376 search results - page 72 / 76
» Blocking Vulnerable Paths of Wireless Sensor Networks
Sort
View
PERCOM
2003
ACM
16 years 4 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
IROS
2009
IEEE
136views Robotics» more  IROS 2009»
15 years 11 months ago
Integrating asynchronous observations for mobile robot position tracking in cooperative environments
— This paper presents an asynchronous particle filter algorithm for mobile robot position tracking, taking into account time considerations when integrating observations being d...
Andreu Corominas Murtra, Josep Maria Mirats i Tur,...
PERCOM
2007
ACM
16 years 4 months ago
Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and Correlated Mobility
Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real ...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
ICRA
2005
IEEE
217views Robotics» more  ICRA 2005»
15 years 10 months ago
Development of an Autonomous Mobile Surveillance System Using a Network-based RTK-GPS
- This paper describes an autonomous mobile surveillance system usually used in a factory premises with some high-rise buildings. This system consists of a wireless LAN network, a ...
Jun-ichi Meguro, Takumi Hashizume, Jun-ichi Takigu...
NOSSDAV
2009
Springer
15 years 11 months ago
Random network coding on the iPhone: fact or fiction?
In multi-hop wireless networks, random network coding represents the general design principle of transmitting random linear combinations of blocks in the same “batch” to downs...
Hassan Shojania, Baochun Li