In this paper, we present a model for TCP/IP ow control mechanism. The rate at which data is transmitted increases linearly in time until a packet loss is detected. At that point,...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
We explore the capabilities of a robotic sensing system designed to locate objects underwater through active movement of an electric field emitter and sensor apparatus. The system ...
James R. Solberg, Kevin M. Lynch, Malcolm A. MacIv...
— We present here a real time active vision system on a PTZ network camera to track an object of interest. We address two critical issues in this paper. One is the control of the...
— Multi-frequency media access control has been well understood in general wireless ad hoc networks, while in wireless sensor networks, researchers still focus on single frequenc...
Gang Zhou, Chengdu Huang, Ting Yan, Tian He, John ...