Sciweavers

2778 search results - page 461 / 556
» Object localization with whiskers
Sort
View
98
Voted
ICNP
2007
IEEE
15 years 7 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
106
Voted
IEEEPACT
2007
IEEE
15 years 7 months ago
Automatic Correction of Loop Transformations
Loop nest optimization is a combinatorial problem. Due to the growing complexity of modern architectures, it involves two increasingly difficult tasks: (1) analyzing the profita...
Nicolas Vasilache, Albert Cohen, Louis-Noël P...
INFOCOM
2007
IEEE
15 years 7 months ago
The Power Balancing Problem in Energy Constrained Multi-Hop Wireless Networks
— Power efficient operation is very critical in energy constrained multi-hop wireless networks. One important technique is to intelligently assign transmission powers to nodes w...
Randeep Bhatia, Abhishek Kashyap, Erran L. Li
99
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras
IPPS
2007
IEEE
15 years 7 months ago
Parallel Processing for Multi-objective Optimization in Dynamic Environments
This paper deals with the use of parallel processing for multi-objective optimization in applications in which the objective functions, the restrictions, and hence also the soluti...
Mario Cámara, Julio Ortega, Francisco de To...