Sciweavers

4037 search results - page 468 / 808
» Routing without ordering
Sort
View
JSAC
2006
181views more  JSAC 2006»
15 years 4 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
TIFS
2008
149views more  TIFS 2008»
15 years 4 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu
CORR
2004
Springer
127views Education» more  CORR 2004»
15 years 3 months ago
Monitoring, Analyzing, and Controlling Internet-scale Systems with ACME
Analyzing and controlling large distributed services under a wide range of conditions is difficult. Yet these capabilities are essential to a number of important development and o...
David L. Oppenheimer, Vitaliy Vatkovskiy, Hakim We...
TROB
2002
149views more  TROB 2002»
15 years 3 months ago
LOST: localization-space trails for robot teams
Abstract-We describe Localization-Space Trails (LOST), a method that enables a team of robots to navigate between places of interest in an initially unknown environment using a tra...
Richard T. Vaughan, Kasper Støy, Gaurav S. ...
HRI
2010
ACM
15 years 2 months ago
Robots asking for directions: the willingness of passers-by to support robots
—This paper reports about a human-robot interaction field trial conducted with the autonomous mobile robot ACE (Autonomous City Explorer) in a public place, where the ACE robot ...
Astrid Weiss, Judith Igelsböck, Manfred Tsche...