Sciweavers

2394 search results - page 332 / 479
» Implementing Mobile Haskell
Sort
View
TDSC
2011
14 years 9 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
143
Voted
PERCOM
2011
ACM
14 years 6 months ago
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution
—In this paper, we propose P3 -coupon, a Prompt and Privacy-preserving electronic coupon distribution system based on a Probabilistic one-ownership forwarding algorithm. In this ...
Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang, D...
EWSN
2011
Springer
14 years 6 months ago
The Announcement Layer: Beacon Coordination for the Sensornet Stack
Sensornet protocols periodically broadcast beacons for neighborhood information advertisement, but beacon transmissions are costly when power-saving radio duty cycling mechanisms a...
Adam Dunkels, Luca Mottola, Nicolas Tsiftes, Fredr...
152
Voted
PERCOM
2011
ACM
14 years 5 months ago
A robust dead-reckoning pedestrian tracking system with low cost sensors
—The emergence of personal mobile device with low cost sensors, such as accelerometer and digital compass, has made dead-reckoning (DR) an attractive choice for indoor pedestrian...
Yunye Jin, Hong-Song Toh, Wee-Seng Soh, Wai-Choong...
143
Voted
ATAL
2011
Springer
14 years 2 months ago
Exploration strategies based on multi-criteria decision making for search and rescue autonomous robots
Autonomous mobile robots are considered a valuable technology for search and rescue applications, where an initially unknown environment has to be explored to locate human victims...
Nicola Basilico, Francesco Amigoni