The last decade has seen a growing interest in the use of Unmanned Aerial Vehicles (UAVs) for various applications and services. UAVs, or drones as referred to, have shown to be …
We propose a novel framework for abnormal event detection in video that requires no training sequences. Our framework is based on unmasking, a technique previously used for …
B Karp, HT Kung - Proceedings of the 6th annual international …, 2000 - dl.acm.org
We present Greedy Perimeter Stateless Routing (GPSR), a novel routing protocol for wireless datagram networks that uses the positions of routers and a packet's destination to …
A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed lookup …
X Chen, J Tang, S Lao - Applied Sciences, 2020 - mdpi.com
Over the past decades, Unmanned Air Vehicles (UAVs) have achieved outstanding performance in military, commercial and civilian applications. UAVs are increasingly …
A Rowstron, P Druschel - … 2001: IFIP/ACM International Conference on …, 2001 - Springer
This paper presents the design and evaluation of Pastry, a scalable, distributed object location and routing substrate for wide-area peer-to-peer applications. Pastry performs …
S Ratnasamy, P Francis, M Handley, R Karp… - Proceedings of the …, 2001 - dl.acm.org
Hash tables-which map" keys" onto" values"-are an essential building block in modern software systems. We believe a similar functionality would be equally valuable to large …
A fundamental problem that confronts peer-to-peer applications is the efficient location of the node that stores a desired data item. This paper presents Chord, a distributed lookup …
Learn all you need to know about wireless sensor networks! Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless …