Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Recently, Automated Multiple View Inspection (AMVI) has been developed for automated defect detection of manufactured objects, and the framework was successfully implemented for ca...
Luis Pizarro, Domingo Mery, Rafael Delpiano, Migue...
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
In this article, we present the design of a team of heterogeneous, centimeter-scale robots that collaborate to map and explore unknown environments. The robots, called Millibots, a...
Robert Grabowski, Luis E. Navarro-Serment, Christi...
For a large-scale data-intensive environment, such as the World-Wide Web or data warehousing, we often make local copies of remote data sources. Due to limited network and computa...