Most sensor network applications are dominated by the acquisition of sensor values. Due to energy limitations and high energy costs of communication, in-network processing has been...
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Abstract— This paper describes an investigation into the control of autonomous mobile sensor platforms in a marine sensor network used to provide monitoring of transitory phenome...
Donald P. Eickstedt, Michael R. Benjamin, Henrik S...
− Grid computing infrastructures and applications are increasingly diverse, with networks ranging from very high bandwidth optical networks to wireless networks and applications ...
Xinran (Ryan) Wu, Andrew A. Chien, Matti A. Hiltun...
Background: There are many data mining methods but few comparisons between them. For example, there are at least two ways to build quality optimizers, programs that find project o...