— This paper describes designing expression of robot’s primitive minds in a simple and effective way. Although expression of robot’s minds like internal states is becoming a ...
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
The performance of a sensor network may be best judged by the quality of application specific information return. The actual sensing performance of a deployed sensor network depe...
Aman Kansal, Eric Yuen, William J. Kaiser, Gregory...
— The maturing domain of ad hoc networking still holds some major challenges on its way to commercial exploitation. The dynamic and decentralized nature of ad hoc networks calls ...
Applications running on a mobile and wireless devices must be able to adapt gracefully to limited and fluctuating network resources. The variety of applications, platforms upon w...
Yuri Dotsenko, Eyal de Lara, Dan S. Wallach, Willy...