Sciweavers

2771 search results - page 494 / 555
» Using Computational Reflection in Optimistic Distributed Sim...
Sort
View
TON
2008
75views more  TON 2008»
14 years 11 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
ICRA
2010
IEEE
149views Robotics» more  ICRA 2010»
14 years 9 months ago
Towards simplicial coverage repair for mobile robot teams
— In this note, we present initial results towards developing a distributed algorithm for repairing topological holes in the sensor cover of a mobile robot team. Central to our a...
Jason C. Derenick, Vijay Kumar, Ali Jadbabaie
JUCS
2010
125views more  JUCS 2010»
14 years 9 months ago
Position-based Routing Protocol for Low Power Wireless Sensor Networks
: We present a table-less position based routing scheme for low power data centric wireless sensor networks. Our proposed scheme is localized, uses greedy forwarding approach, and ...
Sajjad Ahmad Madani, Daniel Weber, Stefan Mahlknec...
COLT
2010
Springer
14 years 9 months ago
An Asymptotically Optimal Bandit Algorithm for Bounded Support Models
Multiarmed bandit problem is a typical example of a dilemma between exploration and exploitation in reinforcement learning. This problem is expressed as a model of a gambler playi...
Junya Honda, Akimichi Takemura
ICIP
2009
IEEE
14 years 9 months ago
Optimized energy allocation in battery powered image sensor networks
We investigate energy allocation strategies in image sensor networks for the purpose of maximizing the network operational lifetime. For the application scenarios that we consider...
Chao Yu, Gaurav Sharma