—One part of the vision of ubiquitous computing is the integration of sensing and actuation nodes into everyday objects, clothes worn on the body, and in large numbers into the e...
Clemens Lombriser, Andreas Bulling, Andreas Breite...
Abstract. This paper investigates the processes used by an evolved, embodied simulated agent to adapt to large disruptive changes in its sensor morphology, whilst maintaining perfo...
Peter Fine, Ezequiel A. Di Paolo, Eduardo Izquierd...
The cost of damage caused by flooding is directly related to the warning-time given before a flood occurs. Therefore, improving the coverage, accuracy and reliability of flood pre...
Danny Hughes, Phil Greenwood, Geoff Coulson, Gordo...
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Abstract-- In this paper, we investigate communication strategies for the multiple access channel with feedback and correlated sources (MACFCS). The MACFCS models a wireless sensor...