Sciweavers

1750 search results - page 103 / 350
» Research challenges of autonomic computing
Sort
View
107
Voted
CISIS
2009
IEEE
15 years 10 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
132
Voted
CEC
2007
IEEE
15 years 10 months ago
AIS for misbehavior detection in wireless sensor networks: Performance and design principles
— A sensor network is a collection of wireless devices that are able to monitor physical or environmental conditions. These devices are expected to operate autonomously, be batte...
Martin Drozda, Sven Schaust, Helena Szczerbicka
130
Voted
ADHOCNOW
2004
Springer
15 years 9 months ago
Adaptive Probing and Communication in Sensor Networks
Sensor networks consist of multiple low-cost, autonomous, ad-hoc sensors, that periodically probe and react to the environment and communicate with other sensors or devices. A prim...
Iftach Ragoler, Yossi Matias, Nimrod Aviram
131
Voted
ICRA
1999
IEEE
118views Robotics» more  ICRA 1999»
15 years 8 months ago
Rapid Physics-Based Rough-Terrain Rover Planning with Sensor and Control Uncertainty
In future planetary exploration missions, rovers will be required to autonomously traverse challenging environments. Much of the previous work in robot motion planning cannot be s...
Karl Iagnemma, Frank Génot, Steven Dubowsky
116
Voted
ATAL
2008
Springer
15 years 5 months ago
The conclusion of contracts by software agents in the eyes of the law
Faced with the ongoing evolution of software agents from mere passive tools to e-tailers acting autonomously for their human owners (principals), new legal challenges appear on th...
Tina Balke, Torsten Eymann