Sciweavers

1536 search results - page 280 / 308
» Flexible simulation of distributed protocols for mobile comp...
Sort
View
P2P
2005
IEEE
106views Communications» more  P2P 2005»
14 years 1 months ago
Chord on Demand
Structured peer-to-peer overlay networks are now an established paradigm for implementing a wide range of distributed services. While the problem of maintaining these networks in ...
Alberto Montresor, Márk Jelasity, Özal...
CVPR
2007
IEEE
14 years 9 months ago
Active Visual Object Reconstruction using D-, E-, and T-Optimal Next Best Views
In visual 3-D reconstruction tasks with mobile cameras, one wishes to move the cameras so that they provide the views that lead to the best reconstruction result. When the camera ...
Stefan Wenhardt, Benjamin Deutsch, Elli Angelopoul...
ICDCS
2009
IEEE
14 years 4 months ago
CLIQUE: Role-Free Clustering with Q-Learning for Wireless Sensor Networks
Clustering and aggregation inherently increase wireless sensor network (WSN) lifetime by collecting information within a cluster at a cluster head, reducing the amount of data thr...
Anna Förster, Amy L. Murphy
ICDCSW
2008
IEEE
14 years 2 months ago
A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks
Reputation and Trust-based Monitoring Systems (RTMSs) have provided a ubiquitous framework for secure Wireless Sensor Network (WSN) computing. Employing sensors for neighborhood m...
Avinash Srinivasan, Feng Li, Jie Wu
WISEC
2010
ACM
13 years 7 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...