Sciweavers

211 search results - page 32 / 43
» Mobility Control with Local Views of Neighborhood in Mobile ...
Sort
View
IWIA
2005
IEEE
14 years 2 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
SAC
2009
ACM
14 years 1 months ago
Self-organized control of knowledge generation in pervasive computing systems
Pervasive computing devices (e.g., sensor networks, localization devices, cameras, etc.) are increasingly present in every aspect of our lives. These devices are able to generate ...
Gabriella Castelli, Ronaldo Menezes, Franco Zambon...
PERCOM
2010
ACM
14 years 1 months ago
Pervasive maps: Explore and interact with pervasive environments
—Efficient discovery of nearby devices and services is one of the preconditions to obtain a usable pervasive environment. Typical user interfaces in these environments hide the ...
Geert Vanderhulst, Kris Luyten, Karin Coninx
SMC
2007
IEEE
129views Control Systems» more  SMC 2007»
14 years 3 months ago
Using micro-climate sensing to enhance RF localization in assisted living environments
In this paper, we propose micro-climate sensing as an effective means of enhancing conventional RF-based localization. Our system targets people tracking applications in dynamic i...
Anthony Rowe, Zane Starr, Raj Rajkumar
NIPS
2003
13 years 10 months ago
Distributed Optimization in Adaptive Networks
We develop a protocol for optimizing dynamic behavior of a network of simple electronic components, such as a sensor network, an ad hoc network of mobile devices, or a network of ...
Ciamac Cyrus Moallemi, Benjamin Van Roy