Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor no...
— We study the problem of vision-based flocking and coordination of a group of kinematic agents in 2 and 3 dimensions. It is shown that in the absence of communication among age...
— Topology control is the problem of assigning power levels to the nodes of an ad hoc network so as to create a specified network topology while minimizing the energy consumptio...
— A salient feature of upcoming communication networks is unprecedented dynamicity, which can only be handled in a large scale by introducing self-configuration and self-maintena...
Cornelia Kappler, Kostas Pentikousis, Carlos Pinho