In this paper, we introduce a prewrite operation before a write operation in a mobile transaction to improve data availability. A prewrite operation does not update the state of a...
Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can ...
Despite the progress made in Ubiquitous Computing since it was first envisaged back in 1987 [1], its use is still isolated to the research community. In this paper, we present why...
We introduce and motivate crowd computing, which combines mobile devices and social interactions to achieve large-scale distributed computation. An opportunistic network of mobile...
Derek Gordon Murray, Eiko Yoneki, Jon Crowcroft, S...
This contribution presents Soft Computing Robot Navigation for mobile robot SCORCAS, a Case Study. The Navigation uses fuzzy logic experienced on mobile robot systems. Fuzzy logic...