Sciweavers

1225 search results - page 170 / 245
» Investigating Ontologies for Simulation Modeling
Sort
View
IJSR
2011
74views more  IJSR 2011»
13 years 5 months ago
Acting Deceptively: Providing Robots with the Capacity for Deception
Deception is utilized by a variety of intelligent systems ranging from insects to human beings. It has been argued that the use of deception is an indicator of theory of mind [2] ...
Alan R. Wagner, Ronald C. Arkin
EJWCN
2010
237views more  EJWCN 2010»
13 years 4 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
ICASSP
2011
IEEE
13 years 1 months ago
Array-based GNSS acquisition in the presence of colored noise
This paper investigates the application of the Generalized Likelihood Ratio Test detector to the Global Navigation Satellite System array-based acquisition problem. We consider an...
Javier Arribas, Carles Fernández-Prades, Pa...
JSAC
2011
137views more  JSAC 2011»
13 years 26 days ago
A Region-Based Clustering Mechanism for Channel Access in Vehicular Ad Hoc Networks
—Several contention-based Medium Access Control (MAC) protocols have been proposed for the vehicles to gain the radio channels to distribute active safety messages timely, e.g., ...
Yen-Cheng Lai, Phone Lin, Wanjiun Liao, Chung-Min ...
SECON
2008
IEEE
14 years 4 months ago
Analytical Study of Collaborative Information Coverage for Object Detection in Sensor Networks
—Many sensor networks are deployed for the purpose of covering and monitoring a particular region, and detecting the object of interest in the region. In this paper, based on the...
Guanqun Yang, Vinod Shukla, Daji Qiao