Sciweavers

1487 search results - page 264 / 298
» Information assurance in sensor networks
Sort
View
TWC
2008
143views more  TWC 2008»
14 years 9 months ago
Power-efficient wireless OFDMA using limited-rate feedback
Emerging applications involving low-cost wireless sensor networks motivate well optimization of multi-user orthogonal frequency-division multiple access (OFDMA) in the power-limite...
Antonio G. Marqués, Georgios B. Giannakis, ...
INFFUS
2002
155views more  INFFUS 2002»
14 years 9 months ago
Image fusion techniques for remote sensing applications
Image fusion refers to the acquisition, processing and synergistic combination of information provided by various sensors or by the same sensor in many measuring contexts. The aim...
G. Simone, Alfonso Farina, Francesco Carlo Morabit...
ICRA
2010
IEEE
149views Robotics» more  ICRA 2010»
14 years 8 months ago
Towards simplicial coverage repair for mobile robot teams
— In this note, we present initial results towards developing a distributed algorithm for repairing topological holes in the sensor cover of a mobile robot team. Central to our a...
Jason C. Derenick, Vijay Kumar, Ali Jadbabaie
MOBIHOC
2005
ACM
15 years 9 months ago
Sextant: a unified node and event localization framework using non-convex constraints
Determining node and event locations is a canonical task for many wireless network applications. Yet dedicated infrastructure for determining position information is expensive, en...
Emin Gün Sirer, Rohan Murty, Saikat Guha
MOBICOM
2010
ACM
14 years 10 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...