Sciweavers

1184 search results - page 219 / 237
» Connecting Sensor Networks with TCP IP Network
Sort
View
CMS
2006
13 years 8 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
AROBOTS
1999
110views more  AROBOTS 1999»
13 years 7 months ago
Self-Localization of Autonomous Robots by Hidden Representations
We present a framework for constructing representations of space in an autonomous agent which does not obtain any direct information about its location. Instead the algorithm relie...
J. Michael Herrmann, Klaus Pawelzik, Theo Geisel
MM
2010
ACM
167views Multimedia» more  MM 2010»
13 years 7 months ago
Improving online gaming quality using detour paths
We study the problem of improving the user perceived quality of online games in which multiple players form a game session and exchange game-state updates over an overlay network....
Cong Ly, Cheng-Hsin Hsu, Mohamed Hefeeda
MOBICOM
2010
ACM
13 years 7 months ago
Exploiting temporal stability and low-rank structure for localization in mobile networks
Localization is a fundamental operation for many wireless networks. While GPS is widely used for location determination, it is unavailable in many environments either due to its h...
Swati Rallapalli, Lili Qiu, Yin Zhang, Yi-Chao Che...
JDCTA
2010
119views more  JDCTA 2010»
13 years 2 months ago
Distributed Dual Cluster Algorithm Based on Grid for Sensor Streams
In practical applications, Wireless Sensor Networks generate massive data streams with the dual attributes in geography and optimization domain. Energy source of sensor nodes in W...
Jianghua Huang, Junying Zhang