Sciweavers

1368 search results - page 64 / 274
» Perfect Local Computability and Computable Simulations
Sort
View
DSN
2008
IEEE
15 years 5 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
ICDCS
2008
IEEE
15 years 5 months ago
Sensor Node Localization Using Uncontrolled Events
Many event-driven localization methods have been proposed as low cost, energy efficient solutions for wireless senor networks. In order to eliminate the requirement of accurately...
Ziguo Zhong, Dan Wang, Tian He
ICASSP
2010
IEEE
14 years 11 months ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu
TSP
2008
107views more  TSP 2008»
14 years 10 months ago
On Energy-Based Acoustic Source Localization for Sensor Networks
In this paper, energy-based localization methods for source localization in sensor networks are examined. The focus is on least-squares-based approaches due to a good tradeoff betw...
Chartchai Meesookho, Urbashi Mitra, Shrikanth Nara...
VRML
1998
ACM
15 years 3 months ago
The Peloton Bicycling Simulator
Peloton is a sports simulator that uses the Virtual Reality Modeling Language (VRML) to create virtual environments for athletic training and competition. In particular, it create...
Gianpaolo U. Carraro, Mauricio Cortes, John T. Edm...