The proceedings contain 23 papers. The topics discussed include: using fuzzy cognitive maps as an intelligent analyst;development of an artificial intelligence system for detection and visualization of auto theft reco...
详细信息
ISBN:
(纸本)0780391764
The proceedings contain 23 papers. The topics discussed include: using fuzzy cognitive maps as an intelligent analyst;development of an artificial intelligence system for detection and visualization of auto theft recovery patterns;soft computing techniques for analysis of kidnapping crimes in Columbia;fuzzy logic-optimized secure media access control (FSMAC) protocol for wireless sensor networks;signal change detection in sensor networks with artificial neural network structure;a multi-modal multi-paradigm agent-based approach to design scalable distributed biometric systems;context-based knowledge integration for operational decision support in network-centric environment;fuzzy deployment for wireless sensor networks;neural network based video surveillance system;and improved noise tolerance for sonar applications in critical environments.
We present an efficient and implementable algorithm for maximizing data extraction from energy limited wireless sensor networks. A distinguishing feature of this algorithm is that it arrives at efficient routing solut...
详细信息
Amorphous computing promises a novel approach with massively distributedsystems. Research in the field hasn't yet produced any formal methodology for design of such system. Paintable computing architecture provid...
详细信息
ISBN:
(纸本)953713802X
Amorphous computing promises a novel approach with massively distributedsystems. Research in the field hasn't yet produced any formal methodology for design of such system. Paintable computing architecture provides an interesting testbed for process self-assembly and together with wireless sensor networks, presents a platform whose goal is to tightly integrate with its environment. Such a platform could combine the best of both technologies while running applications composed of fragments resembling classical software agents capable of mobility. This article presents an introduction to changes that are necessary to have all these similar computing approaches unite.
The proceedings contain 50 papers. The topics discussed include: reducing reauthentication delay in wireless networks;providing distributed certificate authority service in mobile ad hoc networks;on improving the perf...
详细信息
ISBN:
(纸本)0769523692
The proceedings contain 50 papers. The topics discussed include: reducing reauthentication delay in wireless networks;providing distributed certificate authority service in mobile ad hoc networks;on improving the performance of role-based cascaded delegation in ubiquitous computing;a privacy preserving reputation system for mobile information dissemination networks;a privacy service for context-aware mobile computing;protecting location privacy through path confusion;a solution for wireless privacy and payments based on e-cash;a level key infrastructure for secure and efficient group communication in wireless sensor networks;a modified secure remote password (SRP) protocol for key initialization and exchange in bluetooth systems;an efficient key management algorithm for hierarchical group communication;and a deterministic pairwise key pre-distribution scheme for mobile sensor networks.
Localization is an important issue in wireless sensor networks (WSNs). Several applications in WSNs can tolerate the diverse levels of accuracy in geographic information such as physical location. Besides, direction i...
详细信息
Location information is crucial for many applications of sensor networks to fulfill their functions. A mobile sensor network is comprised of both mobile and stationary sensors. So far little work has been done to tack...
详细信息
Bluetooth is a promising short-range wireless communication technology with the characteristics of interference resilience and power efficiency which are required by wireless sensor networks. As an enhanced sensor nod...
详细信息
The proceedings contain 119 papers. The special focus in this conference is on Parallel and distributed Processing and Applications. The topics include: Present and future supercomputer architectures;challenges in P2P...
ISBN:
(纸本)9783540241287
The proceedings contain 119 papers. The special focus in this conference is on Parallel and distributed Processing and Applications. The topics include: Present and future supercomputer architectures;challenges in P2P computing;multihop wireless Ad Hoc networking: current challenges and future opportunities;an inspector-executor algorithm for irregular assignment;multi-grain parallel processing of data-clustering on programmable graphics hardware;a parallel reed-solomon decoder on the imagine stream processor;asynchronous document dissemination in dynamic Ad Hoc networks;location-dependent query results retrieval in a multi-cell wireless;an efficient mobile data mining model;towards correct distributed simulation of high-level petri nets with fine-grained partitioning;m-guard: a new distributed deadlock detection algorithm based on mobile agent technology;meta-based distributedcomputing framework;locality optimizations for jacobi iteration on distributed parallel;fault-tolerant cycle embedding in the WK-recursive network;RAIDb: redundant array of inexpensive databases;a fault-tolerant multi-agent development framework;a fault tolerance protocol for uploads: design and evaluation;topological adaptability for the distributed token circulation paradigm in faulty environment;adaptive data dissemination in wireless sensor networks;design and analysis of a k-connected topology control algorithm for Ad Hoc networks;on using temporal consistency for parallel execution of real-time queries in wireless sensorsystems;cluster-based parallel simulation for large scale molecular dynamics in microscale thermophysics;parallel checkpoint/recovery on cluster of IA-64 computers;an enhanced message exchange mechanism in cluster-based mobile;a scalable low discrepancy point generator for parallel computing;generalized trellis stereo matching with systolic array.
Wireless sensor network (WSN) nodes have strict constrained resource and wireless communication function. Traditional embedded operation systems are either resource consumptive or nonsupport for real-time multi-task o...
详细信息
A network of sensors can be used to obtain state-based data from the area in which they are deployed. To reduce costs, the data, sent via intermediate sensors to a sink, is often aggregated (or compressed). This compr...
详细信息
暂无评论