In this paper we focus on the problem of continuously monitoring the set of Reverse k-Nearest Neighbors (RkNNs) of a query object in a moving object database using a client server...
Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised ma...
Thorsten Holz, Moritz Steiner, Frederic Dahl, Erns...
We consider the problem of coordination and control of large heterogeneous groups of agents distributed over the Internet in the context of Law-Governed Interaction (LGI) [2, 5]. L...
Xuhui Ao, Naftaly H. Minsky, Thu D. Nguyen, Victor...
Many research projects have defined applications that are claimed to operate in a MANet environment. Consider for instance these software tools that make it possible to share inf...
— A decentralized sensor positioning algorithm is proposed using an adaptive weighted-interpolation method. The proposed method utilizes in-network processing among sensors to co...
Finding icebergs ? items whose frequency of occurrence is above a certain threshold ? is an important problem with a wide range of applications. Most of the existing work focuses ...