Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
Wireless sensor networks (WSNs) deployed for missioncritical applications face the fundamental challenge of meeting stringent spatiotemporal performance requirements using nodes w...
Guoliang Xing, Jianping Wang, Ke Shen, Qingfeng Hu...
—This paper proposes a method for near-optimal navigation of high speed mobile robots on uneven terrain. The method relies on a layered control strategy. A high-level planning la...
This paper describes our experience when applying formal methods in the design of the tourist information system TIP, which presents context-sensitive information to mobile users ...
This paper presents an analysis of the control overhead involved in clustering and routing for one-hop clustered mobile ad hoc networks. Previous work on the analysis of control o...
Mingqiang Xue, Inn Inn Er, Winston Khoon Guan Seah