The basic argument presented in the paper is that actor network theory has often been forced to adopt the ontology of interpretivism and thus suppress its own ontology. Interpreti...
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Abstract. This paper calls on activity theory as tool for analyzing Asynchronous Learning Networks (ALN) to achieve a better understanding of their dynamics. This paper makes some ...
Distributed storage systems apply erasure-tolerant codes to guarantee reliable access to data despite failures of storage resources. While many codes can be mapped to XOR operatio...
Graph theory has been used to characterize the solvability of the sensor network localization problem. If sensors correspond to vertices and edges correspond to sensor pairs betwee...
Brian D. O. Anderson, Iman Shames, Guoqiang Mao, B...