Sciweavers

5358 search results - page 963 / 1072
» Script-based Presentation of Simulation Results
Sort
View
104
Voted
DASFAA
2005
IEEE
106views Database» more  DASFAA 2005»
15 years 9 months ago
Real Datasets for File-Sharing Peer-to-Peer Systems
The fundamental drawback of unstructured peer-to-peer (P2P) networks is the flooding-based query processing protocol that seriously limits their scalability. As a result, a signiď...
Shen-Tat Goh, Panos Kalnis, Spiridon Bakiras, Kian...
133
Voted
ICDCS
2005
IEEE
15 years 9 months ago
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
Donggang Liu, Peng Ning, Wenliang Du
161
Voted
ICRA
2005
IEEE
130views Robotics» more  ICRA 2005»
15 years 9 months ago
Modeling and Control of Active End Effector for the AFM Based Nano Robotic Manipulators
Abstract— Nanomanipulation using Atomic Force Microscope (AFM) has been extensively investigated for many years. However, control of tip position during nanomanipulation is still...
Jiangbo Zhang, Guangyong Li, Ning Xi
132
Voted
ICRA
2005
IEEE
168views Robotics» more  ICRA 2005»
15 years 9 months ago
Control of Scalable Wet SMA Actuator Arrays
- This paper presents a new control method to drive an array of wet Shape Memory Alloy actuators utilizing a Matrix Manifold and Valve system (MMV). The MMV architecture allows a v...
L. Flemming, Stephen A. Mascaro
145
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
RID: radio interference detection in wireless sensor networks
— In wireless sensor networks, many protocols assume that if node A is able to interfere with node B’s packet reception, then node B is within node A’s communication range. I...
Gang Zhou, Tian He, John A. Stankovic, Tarek F. Ab...