Sciweavers

2365 search results - page 428 / 473
» Computing a Representation of the Local Environment
Sort
View
JSAC
2006
127views more  JSAC 2006»
13 years 8 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
PAA
2008
13 years 8 months ago
Robust automated multiple view inspection
Recently, Automated Multiple View Inspection (AMVI) has been developed for automated defect detection of manufactured objects, and the framework was successfully implemented for ca...
Luis Pizarro, Domingo Mery, Rafael Delpiano, Migue...
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 8 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
AROBOTS
2000
104views more  AROBOTS 2000»
13 years 8 months ago
Heterogeneous Teams of Modular Robots for Mapping and Exploration
In this article, we present the design of a team of heterogeneous, centimeter-scale robots that collaborate to map and explore unknown environments. The robots, called Millibots, a...
Robert Grabowski, Luis E. Navarro-Serment, Christi...
VLDB
2002
ACM
95views Database» more  VLDB 2002»
13 years 8 months ago
Effective Change Detection Using Sampling
For a large-scale data-intensive environment, such as the World-Wide Web or data warehousing, we often make local copies of remote data sources. Due to limited network and computa...
Junghoo Cho, Alexandros Ntoulas