Abstract. Wireless sensor networks are increasingly being used in environmental monitoring applications. Collecting raw data from these networks can lead to excessive energy consum...
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
This paper presents a vision-based approach to SLAM in indoor / outdoor environments with minimalistic sensing and computational requirements. The approach is based on a graph repr...
Henrik Andreasson, Tom Duckett, Achim J. Lilientha...
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Wireless Sensor Networks (WSNs) are employed in many applications in order to collect data. One key challenge is to minimize energy consumption to prolong network lifetime. A sche...
Yingshu Li, Chunyu Ai, Wiwek P. Deshmukh, Yiwei Wu