Sciweavers

2504 search results - page 409 / 501
» Distributed Mobility Control for Fault-Tolerant Mobile Netwo...
Sort
View
IWSOS
2009
Springer
14 years 2 months ago
Revisiting P2P Content Sharing in Wireless Ad Hoc Networks
Classical content sharing applications like BitTorrent are not designed to run over wireless networks. When adapting them to these constrained networks, two main problems arise. On...
Mohamed Karim Sbai, Chadi Barakat
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 5 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
KES
2005
Springer
14 years 1 months ago
Bayesian Inference Driven Behavior Network Architecture for Avoiding Moving Obstacles
This paper presents a technique for an intelligent robot to adaptively behave in unforeseen and dynamic circumstances. Since the traditional methods utilized the relatively reliabl...
Hyeun-Jeong Min, Sung-Bae Cho
TMC
2008
152views more  TMC 2008»
13 years 7 months ago
CDR-MAC: A Protocol for Full Exploitation of Directional Antennas in Ad Hoc Wireless Networks
In this paper, we propose a new Medium Access Control (MAC) protocol for full exploitation of directional antennas in wireless networks. The protocol introduces a circular directio...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...
CDC
2010
IEEE
150views Control Systems» more  CDC 2010»
13 years 2 months ago
Consensus on asynchronous communication networks in presence of external input
This paper presents a class of multi-agent systems where the state of each agent is driven by its own local protocol, and by exogenous time-varying input signal. These inputs may r...
C. Pilotto, K. M. Chandy, J. White