Sciweavers

3887 search results - page 710 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
ASPLOS
2006
ACM
15 years 6 months ago
Efficient type and memory safety for tiny embedded systems
We report our experience in implementing type and memory safety in an efficient manner for sensor network nodes running TinyOS: tiny embedded systems running legacy, C-like code. ...
John Regehr, Nathan Cooprider, Will Archer, Eric E...
ANTSW
2008
Springer
15 years 4 months ago
Modeling Phase Transition in Self-organized Mobile Robot Flocks
We implement a self-organized flocking behavior in a group of mobile robots and analyze its transition from an aligned state to an unaligned state. We briefly describe the robot an...
Ali Emre Turgut, Cristián Huepe, Hande &Cce...
NIPS
2008
15 years 3 months ago
Sparse Convolved Gaussian Processes for Multi-output Regression
We present a sparse approximation approach for dependent output Gaussian processes (GP). Employing a latent function framework, we apply the convolution process formalism to estab...
Mauricio Alvarez, Neil D. Lawrence
ESM
2000
15 years 3 months ago
A tool for controlled knowledge discovery in spatial domains
A data simulator that can facilitate the development of improved sampling and analysis procedures for spatial analysis is proposed. The simulator, implemented in MATLAB, provides ...
Dragoljub Pokrajac, Zoran Obradovic, Tim Fiez
147
Voted
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 3 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...