Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Many private and/or public organizations have been reported to create and monitor targeted Twitter streams to collect and understand users’ opinions about the organizations. Tar...
We describe a Simultaneous Localization and Mapping (SLAM) method for a hovering underwater vehicle that will explore underwater caves and tunnels, a true three dimensional (3D) e...
Nathaniel Fairfield, George Kantor, David Wettergr...
—Spectrum access is an important function of cognitive radios for detecting and utilizing spectrum holes without harming the legacy systems. In this paper, we propose novel coope...
Background: The extraction of biological knowledge from genome-scale data sets requires its analysis in the context of additional biological information. The importance of integra...
David J. Reiss, Iliana Avila-Campillo, Vesteinn Th...