


default search action
MASS 2009: Macao, China
- IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS 2009, 12-15 October 2009, Macau (S.A.R.), China. IEEE Computer Society 2009, ISBN 978-1-4244-5113-5

Session 1A: Data Management
- Xiaopeng Fan, Jiannong Cao

, Weigang Wu:
Contention-Aware Data Caching in Wireless Multi-hop Ad Hoc Networks. 1-9 - Xu Cheng, Ji Xu, Jian Pei, Jiangchuan Liu:

Hierarchical Distributed Data Classification in Wireless Sensor Networks. 10-19 - Marco Fiore

, José M. Barceló-Ordinas
:
Cooperative download in urban vehicular networks. 20-29
Session 1B: Localization and Synchronization
- Shigeng Zhang, Jiannong Cao, Lijun Chen, Daoxu Chen:

On Accuracy of Region-based Localization Algorithms for Wireless Sensor Networks. 30-39 - Xiaoyan Li:

Ratio-based Zero-profiling Indoor Localization. 40-49 - Yangfan Zhou, Michael R. Lyu, Jiangchuan Liu:

Surviving Holes and Barriers in Geographic Data Reporting for Wireless Sensor Networks. 50-59
Session 2A: Mobility Management
- Ze Li, Haiying Shen:

A Mobility and Congestion Resilient Data Management System for Mobile Distributed Networks. 60-69 - Wang Liu, Jianping Wang

, Guoliang Xing, Liusheng Huang:
Throughput Capacity of Mobility-assisted Data Collection in Wireless Sensor Networks. 70-79 - Fatmé El-Moukaddem, Eric Torng, Guoliang Xing, Sandeep S. Kulkarni:

Mobile Relay Configuration in Data-intensive Wireless Sensor Networks. 80-89 - Fangfei Chen, Matthew P. Johnson, Yosef Alayev, Amotz Bar-Noy, Tom La Porta:

Who, When, Where: Timeslot Assignment to Mobile Clients. 90-99
Session 2B: Mesh Networks
- Junfang Wang, Kan Cai, Dharma P. Agrawal:

A Multi-Rate Based Router Placement Scheme for Wireless Mesh Networks. 100-109 - Mohammad Nassiri

, Fabrice Theoleyre
, Martin Heusse, Andrzej Duda
:
Molecular MAC for Multichannel Wireless Mesh Networks. 110-119 - Qin Xin, Fredrik Manne, Yan Zhang, Jianping Wang

, Zeyu Zheng:
Almost Optimal Distributed M2M Multicasting in Wireless Mesh Networks. 120-129 - Pan Gun Park

, Piergiuseppe Di Marco
, Pablo Soldati, Carlo Fischione
, Karl Henrik Johansson
:
A Generalized Markov Chain Model For Effective Analysis of Slotted IEEE 802.15.4. 130-139
Session 3A: Application Systems and Testbeds I
- Yi-Tao Wang, Rajive L. Bagrodia:

Scalable Emulation of TinyOS Applications in Heterogeneous Network Scenarios. 140-149 - Raghuram S. Sudhaakar, Chunming Qiao, Seokhoon Yoon

, Jia Zhao:
A MAC Protocol For Real-Time Sensing Applications Using Asymmetric Tranceivers. 150-159 - Jingtong Hu

, Chun Xue
, Yi He, Edwin Hsing-Mean Sha:
Reprogramming with Minimal Transferred Data on Wireless Sensor Network. 160-167
Session 3B: Routing Algorithm and Protocol I
- Mingming Lu, Jie Wu:

Erasure-Coding Based Utility Routing in Multi-hop Wireless Networks. 168-177 - Yang Zhang, Jing Zhao, Guohong Cao, Chita R. Das:

On Interest Locality in Content-Based Routing for Large-scale MANETs. 178-187 - Dhananjay Sampath, J. J. Garcia-Luna-Aceves:

Scalable Integrated Routing Using Prefix Labels and Distributed Hash Tables for MANETs. 188-198
Session 4A: Multi-channel, Multi-radio and MIMO
- Claudio Cicconetti

, Vanessa Gardellin, Luciano Lenzini, Enzo Mingozzi:
PaMeLA: A Joint Channel Assignment and Routing Algorithm for Multi-Radio Multi-Channel Wireless Mesh Networks with Grid Topology. 199-207 - Yanyan Yang, Yunhuai Liu, Lionel M. Ni:

Level the Buffer Wall: Fair Channel Assignment in Wireless Sensor Networks. 208-216 - Shan Chu, Xin Wang:

Adaptive and Distributed Scheduling in Heterogeneous MIMO-based Ad hoc Networks. 217-226 - Miao Zhao

, Yuanyuan Yang
:
Packet Scheduling with Joint Design of MIMO and Network Coding. 227-236
Session 4B: Security and Privacy I
- Bo Zhu, Yanfei Zheng, Yaowei Zhou, Kefei Chen:

How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks. 237-245 - Matthias Gauger, Olga Saukh, Pedro José Marrón

:
Enlighten Me! Secure Key Assignment in Wireless Sensor Networks. 246-255 - Hongbo Zhou, Matt W. Mutka, Lionel M. Ni:

Secure Autoconfiguration and Public-key Distribution for Mobile Ad-hoc Networks. 256-263 - Ying Huang, Wenbo He, Klara Nahrstedt:

ChainFarm: A Novel Authentication Protocol for High-rate Any Source Probabilistic Broadcast. 264-273
Session 5A: Cognitive Networks
- Cheng Wang, Shaojie Tang, Xiang-Yang Li, Changjun Jiang:

Multicast Capacity of Multihop Cognitive Networks. 274-283 - Ilario Filippini

, Eylem Ekici
, Matteo Cesana
:
Minimum Maintenance Cost Routing in Cognitive Radio Networks. 284-293 - Qin Xin, Jie Xiang:

Joint QoS-aware Admission Control, Channel Assignment, and Power Allocation for Cognitive Radio Cellular Networks. 294-303 - Panlong Yang:

Cog Gap: A Cognitive and Opportunistic Gateway Access Algorithm in Wireless Mesh Networks. 304-312
Session 5B: Security and Privacy II
- Yun Wang, Weihuang Fu, Dharma P. Agrawal:

Intrusion Detection in Gaussian Distributed Wireless Sensor Networks. 313-321 - Zhendong Ma, Frank Kargl, Michael Weber:

Measuring location privacy in V2X communication systems with accumulated information. 322-331 - Jian Ren, Yun Li, Tongtong Li:

Providing Source Privacy in Mobile Ad Hoc Networks. 332-341 - Matthew Tan Creti, Matthew Beaman, Saurabh Bagchi, Zhiyuan Li, Yung-Hsiang Lu:

Multigrade Security Monitoring for Ad-Hoc Wireless Networks. 342-352
Session 6A: Data Aggregation and Fusion
- Xiang-Yang Li, XiaoHua Xu, ShiGuang Wang, Shaojie Tang, Guojun Dai, Jizhong Zhao, Yong Qi:

Efficient Data Aggregation in Multi-hop Wireless Sensor Networks under Physical Interference Model. 353-362 - Amitabha Amitava Ghosh, Özlem Durmaz Incel

, Bhaskar Krishnamachari, Anil Vullikanti:
Multi-Channel Scheduling Algorithms for Fast Aggregated Convergecast in Sensor Networks. 363-372 - Miao Zhao

, Yuanyuan Yang
:
Bounded Relay Hop Mobile Data Gathering in Wireless Sensor Networks. 373-382
Session 6B: Power-awareness and Energy Efficiency I
- Yangfan Zhou, Junjie Xiong, Michael R. Lyu, Jiangchuan Liu, Kam-Wing Ng:

Energy-efficient On-demand Active Contour Service for Sensor Networks. 383-392 - Khoriba Ghada

, Jie Li
, Yusheng Ji, Guojun Wang:
Cross-layer Approach for Energy Efficient Routing in WANETs. 393-402 - Dajin Wang:

An Analytical Study of Subdividing Hexagon-Clustered WSN for Power Saving. 403-412
Session 7A: Delay Tolerant Networks
- Cong Liu, Jie Wu, Ionut Cardei:

Message Forwarding in Cyclic MobiSpace: the Multi-copy Case. 413-422 - Ramon Serna Oliver, Gerhard Fohler

:
Probabilistic Estimation of End-to-End Path Latency in Wireless Sensor Networks. 423-431 - Xueli An, Ramin Hekmat:

Probabilistic-based Message Dissemination in Ad-Hoc and Sensor Networks using Directional Antennas. 432-438
Session 7B: Power-awareness and Energy Efficiency II
- Guanfeng Liang, Nitin H. Vaidya:

Cooperation Helps Power Saving. 439-447 - Jonathan Tate, Iain Bate:

An Improved Lightweight Synchronisation Primitive For Sensornets. 448-457 - Qianqian Ren, Jianzhong Li, Hong Gao:

TPSS: A Two-phase Sleep Scheduling Protocol for Object Tracking in Wireless Sensor Networks. 458-465
Session 8A: Coverage and Connectivity
- Xu Li, Hannes Frey, Nicola Santoro

, Ivan Stojmenovic:
Focused-Coverage by Mobile Sensor Networks. 466-475 - Xiaole Bai, Lei Ding, Jin Teng, Changqing Xu, Dong Xuan:

Directed Coverage in Wireless Sensor Networks: Concept and Quality. 476-485 - Yu Gu, Jie Li

, Baohua Zhao, Yusheng Ji:
Target Coverage Problem in Wireless Sensor Networks: A Column Generation Based Approach. 486-495 - Chris Yu-Tak Ma, David K. Y. Yau, Nung Kwan Yip, Nageswara S. V. Rao

, Jiming Chen:
Performance Analysis of Stochastic Network Coverage with Limited Mobility. 496-505
Session 8B: Multicast and Broadcast
- Cheng Zhan, Yinlong Xu, Jianping Wang

, Victor C. S. Lee
:
Reliable Multicast in Wireless Networks Using Network Coding. 506-515 - Zheng Li, Deying Li:

Interference and Power Constrained Broadcasting and Multicasting in Wireless Ad Hoc Networks with Directional Antennas. 516-525 - Peng-Jun Wan, Lixin Wang, Ophir Frieder:

Fast Group Communications in Multihop Wireless Networks Subject to Physical Interference. 526-533 - Ming Li, Wenjing Lou, Kai Zeng:

OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links. 534-543
Session 9A: Application Systems and Testbeds II
- Yuan Yuan, Shanshan Li, Kui Wu, Weijia Jia

, Yuxing Peng:
FOCUS: A Cost-Effective Approach for Large-Scale Crop Monitoring with Sensor Networks. 544-553 - Wei Dong, Chun Chen, Xue Liu, Jiajun Bu, Yunhao Liu:

Dynamic Linking and Loading in Networked Embedded Systems. 554-562 - Scott Pudlewski

, Tommaso Melodia
:
DMRC: Distortion-Minimizing Rate Control for Wireless Multimedia Sensor Networks. 563-572
Session 9B: Routing Algorithm and Protocol II
- Oday D. Jerew

, Haley M. Jones, Kim L. Blackmore
:
On the Minimum Number of Neighbours for Good Routing Performance in MANETs. 573-582 - Stephen Dabideen, J. J. Garcia-Luna-Aceves:

OWL: Towards Scalable Routing in MANETs Using Depth-First Search On Demand. 583-592 - Tao Chen

, Deke Guo, Xue Liu, Honghui Chen, Xueshan Luo, Junxian Liu:
BDP: A Bloom Filters Based Dissemination Protocol in Wireless Sensor Networks. 593-602
InVANET Workshop
- Eugenio Giordano, Raphaël Frank, Abhishek Ghosh, Giovanni Pau

, Mario Gerla:
Two Ray or not Two Ray this is the price to pay. 603-608 - Gongjun Yan, Danda B. Rawat, Samy El-Tawab:

Ticket-based Reliable Routing in VANET. 609-614 - Ching-Ling Huang, Yaser Pourmohammadi Fallah, Raja Sengupta:

Analysis of Aggregated Power Level and Rate-Power Control Designs for Status Update Messages in VANETs. 615-620 - Eun-Kyu Lee, Sungwon Yang, Soon-Young Oh, Mario Gerla:

RF-GPS: RFID Assisted Localization in VANETs. 621-626 - Samy El-Tawab, Mahmoud Abuelela, Gongjun Yan:

Real-Time Weather Notification System using Intelligent Vehicles and Smart Sensors. 627-632 - Hongyu Huang, Minjie Zhu, Minglu Li, Xu Li, Min-You Wu, Linghe Kong

:
LICP: A Look-ahead Intersection Control Policy with Intelligent Vehicles. 633-638
MeshTech Workshop
- Pranjal Pandey, Sethuraman Satish, Joy Kuri, Haresh Dagale:

Design & Implementation of IEEE 802.11s Mesh Nodes with Enhanced Features. 639-644 - Qizhi Cao, Tianji Li, Douglas J. Leith

:
Achieving Fairness in Lossy 802.11e Wireless Multi-Hop Mesh Networks. 645-650 - Andrey I. Lyakhov, Ivan Pustogarov, Alexander A. Safonov, Mikhail Yakimov:

Starvation Effect Study in IEEE 802.11 Mesh Networks. 651-656 - Leonardo Badia

:
Evaluation of a Potential Energy Methodology for Joint Routing and Scheduling in Wireless Mesh Networks. 657-662 - Raffaele Bruno

, Vania Conan, Stéphane Rousseau:
Route Selection for Capacity Maximization in Multi-Rate TDMA-based Wireless Ad Hoc Networks. 663-669 - Yanhua Li, Wei Chen

, Zhi-Li Zhang:
Optimal Forwarder List Selection in Opportunistic Routing. 670-675 - Chia-Sheng Chou, Chien Chen, Ying-Yu Chen, Rong-Hong Jan, Cheng-Chung Hsieh:

Multicast Routing and Channel Assignment in Wireless Mesh Networks. 676-681 - Chengxuan He, Oliver Yang, Guoqiang Wang:

Performance Evaluation of a WiMAX Multi-Hop Relay System to Support Multicast/Broadcast Service. 682-687 - Tzu-Chieh Tsai

:
Quality-Aware Multiple Backbone Construction on Multi-interface Wireless Mesh Networks for P2P Streaming. 688-693
TSP Workshop
- Michael Smit, Kelly A. Lyons, Michael McAllister, Jacob Slonim:

Detecting Privacy Infractions in Applications: A Framework and Methodology. 694-701 - Yinan Shan, Zhenfu Cao:

Extended Attribute Based Encryption for Private Information Retrieval. 702-707 - Cong Zheng, Lansheng Han, Jihang Ye, Mengsong Zou, Qiwen Liu:

A Fuzzy Comprehensive Evaluation Model for Harms of Computer Virus. 708-713 - Yasuo Hatano, Kunihiko Miyazaki, Toshinobu Kaneko:

A Study on Read-Write Protection of a Digital Document by Cryptographic Techniques. 714-721 - Fuwen Liu, Hartmut König:

Security Considerations on Pervasive Real-time Collaboration. 722-727 - Zhiqiang Wei, Wei Zhou, Mijun Kang, Michael Collins, Paddy Nixon:

A Strategy-proof Trust Mechanism for Pervasive Computing Environments. 728-731 - Manmeet Mahinderjit Singh

, Xue Li
:
Computational Model for Trust Management in RFID Supply Chains. 734-740 - Hossein Rezaei Ghaleh, Siavash Khorsandi:

A New High-Performance Approach for Offline Replacement Attack Prevention in Trusted Clients. 741-746 - YongQing Ni, DaeHun Nyang, Xu Wang:

A-Kad: an anonymous P2P protocol based on Kad network. 747-752 - Anoosha Prathapani, Lakshmi Santhanam, Dharma P. Agrawal:

Intelligent Honeypot Agent for Blackhole Attack Detection in Wireless Mesh Networks. 753-758 - Xiyuan Chen, Miaoliang Zhu:

A Directed Acyclic Graph based Detection for RBAC Based Secure. 759-764 - Minh-Triet Tran

, Anh Duc Duong, Isao Echizen:
RPROB - A Family of Binomial-Mix-based Anonymous Communication Systems. 765-770 - Ruidong Li

, Jie Li
:
Towards Neutral Trust Management Framework in Unstructured Networks. 771-776 - Do Van Thanh, Ivar Jørstad, Tore E. Jønvik, Do van Thuan:

Strong authentication with mobile phone as security token. 777-782 - Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan:

Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity. 783-789 - Lina Wang, Yuntao Yue, Chi Guo, Xiaoying Zhang:

Design of a Trust Model and Finding Key-Nodes in Rumor Spreading Based on Monte-Carlo Method. 790-795 - Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård:

Requirements for Evidential Value for the Assessment of the Trustworthiness of Digital Records over Time. 796-803 - Gongjun Yan, Stephan Olariu:

An Efficient Geographic Location-based Security Mechanism for Vehicular Adhoc Networks. 804-809 - Habtamu Abie:

Adaptive Security and Trust Management for Autonomic Message-Oriented Middleware. 810-817 - Jihoon Cho:

Strengthening Class1 Gen2 RFID Tags. 818-824 - Meng Wang, Yi Wang

, Duo Liu, Zili Shao:
Improving the Reliability of Embedded Systems with Cache and SPM. 825-830 - Deen Zheng, Zhengwei Qi, Alei Liang, Hongbo Yang, Haibing Guan, Liang Liu:

A Heuristic Policy-based System Call Interposition in Dynamic Binary Translation. 831-835 - Do Van Thanh, Ivar Jørstad, Tor Anders Johansen, Elias Bakken, Do van Thuan:

Pervasive Service Access with SIM-based VPN. 836-841 - Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:

QoS-aware Optimization Strategy for Security Ranking in SSL Protocol. 842-847 - Kanthakumar Pongaliur, Li Xiao, Alex X. Liu:

CENDA-Camouflage Event Based Malicious Node Detection Architecture. 848-855 - Mohammed Benaissa, Tim Good

:
A Low-Frequency RFID to Challenge Security and Privacy Concerns. 856-863 - Yingpei Zeng, Jiannong Cao

, Jue Hong, Li Xie:
Secure localization and location verification in wireless sensor networks. 864-869
WAASN Workshop
- Sheng Wang, Xue Wang

, Yong Wang, Xinyao Sun:
Distributed Lightweight Target Tracking for Wireless Sensor Networks. 870-875 - Weiwei Fang, Xin Zhao, Tianshu Chu, Yuan An, Yi Liu, Depei Qian:

RRDD: Receiver-oriented Robust Data Delivery in Mobile Sensor Networks. 876-881 - YingZhi Zeng, Xia Yan, Jinshu Su

:
A new broadcast-Key Management Scheme for Distributed Wireless Sensor Networks. 882-887 - Neda Edalat, Wendong Xiao, Chen-Khong Tham

, Ehsan Keikha, Lee-Ling S. Ong
:
A Price-based Adaptive Task Allocation for Wireless Sensor Network. 888-893 - Min-You Wu:

Anti-Sensornet: Intruders and Countermeasures. 894-899 - Zhi Li, Yanmin Zhu, Minglu Li:

Practical Location-based Routing Protocol in Vehicular Ad Hoc Networks. 900-905 - Jiehui Chen, Mitsuji Matsumoto:

EUCOW: Energy-Efficient Boundary Monitoring for Unsmoothed Continuous Objects in Wireless Sensor Network. 906-911
WiNA Workshop
- Yi Gu, Qishi Wu, Xiaoshan Cai, Jeremy Bond:

On Efficient Deployment of High-end Sensors in Large-scale Heterogeneous WSNs. 912-917 - Zhengbao Li, Zhongwen Guo, Haipeng Qu, Feng Hong, Pengpeng Chen, Meng Yang:

UD-TDMA: A Distributed TDMA Protocol for Underwater Acoustic Sensor Network. 918-923 - Yuanfang Chen, Mingchu Li, Lei Wang, Zhuxiu Yuan, Weiping Sun, Chunsheng Zhu, Ming Zhu, Lei Shu

:
A Proportional Fair Backoff Scheme for Wireless Sensor Networks. 971-976 - Wen Ouyang, Ying Tsao:

A High-Accuracy Real-Time Localization Algorithm for Wireless Sensor Networks. 924-928 - Xinqing Yan:

An Enhanced Query Tree Protocol for RFID Tag Collision Resolution with Progressive Population Estimation. 935-940 - Panlong Yang:

On Channel Usability of Wireless Mesh Networks -- When Stability Plays With You. 941-946 - Xin Liu, Wenjun Zeng

:
Throughput and Delay Analysis of the IEEE 802.15.3 CSMA/CA Mechanism. 947-952 - Hossam Fattah, Hussein M. Alnuweiri:

A Cross-Layer Design for Dynamic Resource Block Allocation in 3G Long Term Evolution System. 929-934 - Qingsong Yao

, Yong Qi, Jizhong Zhao, Jinsong Han:
An Enhanced Synchronization Approach for RFID Private Authentication. 959-964 - Ahmed Jeddah, Nejib Zaguia, Guy-Vincent Jourdan:

A Note on the Study of Bluetooth Networks' Distributed Algorithms. 953-958 - Chuan-Ming Liu:

A kNN Search Protocol Using a Voronoi Diagram in Wireless Broadcast Environments. 965-970 - Chao Ren, XuFei Mao, Ping Xu, Guojun Dai, Zhanhuai Li:

Delay and Energy Efficiency Tradeoffs for Data Collections in Large Scale Wireless Sensor Networks. 977-982 - Liang-Che Wei, Chih-Wei Kang, Jian-Hung Chen:

A Force-Driven Evolutionary Approach for Multi-objective 3D Differentiated Sensor Network Deployment. 983-988
WSNS Workshop
- YingZhi Zeng, Xia Yan, Jinshu Su

:
A new Group Key Management Scheme based on DMST for Wireless Sensor Networks. 989-994 - Shahid Raza

, Thiemo Voigt, Adriaan Slabbert, Krister Landernäs:
Design and Implementation of a Security Manager for WirelessHART Networks. 995-1004 - Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere:

A Per-Hop Security Scheme for Highly Dynamic Wireless Sensor Networks. 1005-1011 - Xudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, Dong Xuan:

DiffUser: Differentiated User Access Control on Smartphone. 1012-1017 - Jianmin Chen, Jie Wu:

cooperative anonymity authentication in vehicular networks. 1018-1023 - Jungshian Li, ChingFang Yang:

Quantum Communication in Distributed Wireless Sensor Networks. 1024-1029 - Zhijun Li, Guang Gong:

Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networks. 1030-1035 - Feng Cheng, Xiaolong Yin, Reinhard German, Falko Dressler

:
Performance Impact of and Protocol Interdependencies of IEEE 802.15.4 Security Mechanisms. 1036-1041 - Kai Shi, Yantai Shu, Oliver W. W. Yang, Chunfeng Liu:

A Principal-Agent Method to Prevent Selfish MAC Layer Behavior in Wireless Networks. 1042-1047 - Levente Buttyán, Tamás Holczer:

Private Cluster Head Election in Wireless Sensor Networks. 1048-1053 - Yingpei Zeng, Jiannong Cao

, Jue Hong, Shigeng Zhang, Li Xie:
SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor Networks. 1054-1059
Demos
- Joakim Eriksson, Fredrik Österlind, Thiemo Voigt, Niclas Finne, Shahid Raza

, Nicolas Tsiftes, Adam Dunkels:
Accurate Power Profiling of Sensornets with the COOJA/MSPSim Simulator. 1060-1061 - Huang-Chen Lee

, Chuan-Yu Cho, Chung-Ta King, Yao-Min Fang, Bing-Jean Lee:
Design and implementation of non-autonomous mobile wireless sensor for debris flow monitoring. 1062-1064 - Andong Zhan, Shen Li, Tao Li, Lubin Guan, Panlong Yang, Xiaobing Wu, Guihai Chen

:
iTracking: Accurate Light-based Location-tracking in Wireless Sensor Networks. 1065-1067 - Frederik Hermans, Norman Dziengel, Jochen H. Schiller

:
Quality Estimation based Data Fusion in Wireless Sensor Networks. 1068-1070 - Lien-Wu Chen, Kun-Ze Syue, Yu-Chee Tseng:

VS3: A Vehicular Surveillance and Sensing System for Security Applications. 1071-1073 - Jun Zeng, Daoyong Liu, Alei Liang, Haibing Guan:

Pattern Formation Using Multiple Robots. 1074-1076

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














