Sciweavers

815 search results - page 137 / 163
» Deployment algorithms for a power-constrained mobile sensor ...
Sort
View
INFOCOM
2003
IEEE
14 years 2 months ago
A Framework for Reliable Routing in Mobile Ad Hoc Networks
— Mobile ad hoc networks consist of nodes that are often vulnerable to failure. As such, it is important to provide redundancy in terms of providing multiple nodedisjoint paths f...
Zhenqiang Ye, Srikanth V. Krishnamurthy, Satish K....
HT
2009
ACM
13 years 6 months ago
Games with a purpose for social networking platforms
The online games market has matured in recent years. It is now a multi-billion dollar business with hundreds of millions players worldwide. At the same time, social networking pla...
Walter Rafelsberger, Arno Scharl
ICDCN
2009
Springer
14 years 3 months ago
Self-similar Functions and Population Protocols: A Characterization and a Comparison
Chandy et al. proposed the methodology of “self-similar algorithms” for distributed computation in dynamic environments. We further characterize the class of functions computab...
Swapnil Bhatia, Radim Bartos
IROS
2006
IEEE
197views Robotics» more  IROS 2006»
14 years 2 months ago
Heterogeneous Multi-Robot Localization in Unknown 3D Space
— This paper presents a self-localization strategy for a team of heterogenous mobile robots, including ground mobile robots of various sizes and wall-climbing robots. These robot...
Yi Feng 0002, Zhigang Zhu, Jizhong Xiao
PERCOM
2010
ACM
13 years 7 months ago
Privacy assurance in mobile sensing networks: Go beyond trusted servers
—Mobile devices are becoming the largest sensor network around the world. They could be used to collect a large amount of data with little effort and cost which is leading to a p...
Ling Hu, Cyrus Shahabi