When software developers work with a program's source code, the structure of the source code often requires that they split their attention simultaneously across several docu...
In this paper, we present an experimental study of strategies for maintaining end-to-end communication links for tasks such as surveillance, reconnaissance, and target search and ...
M. Ani Hsieh, Anthony Cowley, Vijay Kumar, Camillo...
Leading agent-based trust models address two important needs. First, they show how an agent may estimate the trustworthiness of another agent based on prior interactions. Second, ...
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Fair weights have been implemented to maintain fairness in recent resource allocation schemes. However, designing fair weights for multiservice wireless networks is not trivial bec...