Sciweavers

3887 search results - page 544 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
135
Voted
WORM
2004
15 years 5 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
156
Voted
SENSYS
2004
ACM
15 years 9 months ago
Call and response: experiments in sampling the environment
Monitoring of environmental phenomena with embedded networked sensing confronts the challenges of both unpredictable variability in the spatial distribution of phenomena, coupled ...
Maxim A. Batalin, Mohammad H. Rahimi, Yan Yu, Duo ...
145
Voted
ICRA
2008
IEEE
166views Robotics» more  ICRA 2008»
15 years 10 months ago
Vision-based docking using an autonomous surface vehicle
This paper describes the development and experimental evaluation of a novel vision-based Autonomous Surface Vehicle with the purpose of performing coordinated docking manoeuvres w...
Matthew Dunbabin, Brenton Lang, Brett Wood
159
Voted
SUTC
2010
IEEE
15 years 7 months ago
Data Caching in Ad Hoc Networks Using Game-Theoretic Analysis
— Extensive research has been performed to study selfish data caching in ad hoc networks using game-theoretic analysis. However, due to the caching problem’s theoretical root ...
Yutian Chen, Bin Tang
162
Voted
TMC
2010
250views more  TMC 2010»
15 years 2 months ago
Duty Cycle Control for Low-Power-Listening MAC Protocols
Energy efficiency is of the utmost importance in wireless sensor networks. The family of low-power-listening MAC protocols was proposed to reduce one form of energy dissipation...
Christophe J. Merlin, Wendi Beth Heinzelman