Sciweavers

17582 search results - page 3221 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
ADHOCNETS
2010
Springer
15 years 25 days ago
Guaranteeing Reliable Communications in Mesh Beacon-Enabled IEEE802.15.4 WSN for Industrial Monitoring Applications
Wireless Sensor Networks (WSN) are a very promising solution for industrial monitoring applications in terms of safety, costs, efficiency and productivity. However, in order to mov...
Berta Carballido Villaverde, Susan Rea, Dirk Pesch
COR
2011
14 years 11 months ago
An improved multi-objective evolutionary algorithm for the vehicle routing problem with time windows
The Vehicle Routing Problem with Time Windows is a complex combinatorial problem with many real-world applications in transportation and distribution logistics. Its main objective...
Abel Garcia-Najera, John A. Bullinaria
PERCOM
2011
ACM
14 years 11 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...
NCA
2010
IEEE
14 years 11 months ago
Anatomy-based organization of morphology and control in self-reconfigurable modular robots
In this paper we address the challenge of realizing full-body behaviors in scalable modular robots. We present an experimental study of a biologically inspired approach to organize...
David Johan Christensen, Jason Campbell, Kasper St...
181
Voted
PR
2010
141views more  PR 2010»
14 years 10 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
« Prev « First page 3221 / 3517 Last » Next »