default search action
MASS 2009: Macao, China
- IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS 2009, 12-15 October 2009, Macau (S.A.R.), China. IEEE Computer Society 2009, ISBN 978-1-4244-5113-5
Session 1A: Data Management
- Xiaopeng Fan, Jiannong Cao, Weigang Wu:
Contention-Aware Data Caching in Wireless Multi-hop Ad Hoc Networks. 1-9 - Xu Cheng, Ji Xu, Jian Pei, Jiangchuan Liu:
Hierarchical Distributed Data Classification in Wireless Sensor Networks. 10-19 - Marco Fiore, José M. Barceló-Ordinas:
Cooperative download in urban vehicular networks. 20-29
Session 1B: Localization and Synchronization
- Shigeng Zhang, Jiannong Cao, Lijun Chen, Daoxu Chen:
On Accuracy of Region-based Localization Algorithms for Wireless Sensor Networks. 30-39 - Xiaoyan Li:
Ratio-based Zero-profiling Indoor Localization. 40-49 - Yangfan Zhou, Michael R. Lyu, Jiangchuan Liu:
Surviving Holes and Barriers in Geographic Data Reporting for Wireless Sensor Networks. 50-59
Session 2A: Mobility Management
- Ze Li, Haiying Shen:
A Mobility and Congestion Resilient Data Management System for Mobile Distributed Networks. 60-69 - Wang Liu, Jianping Wang, Guoliang Xing, Liusheng Huang:
Throughput Capacity of Mobility-assisted Data Collection in Wireless Sensor Networks. 70-79 - Fatmé El-Moukaddem, Eric Torng, Guoliang Xing, Sandeep S. Kulkarni:
Mobile Relay Configuration in Data-intensive Wireless Sensor Networks. 80-89 - Fangfei Chen, Matthew P. Johnson, Yosef Alayev, Amotz Bar-Noy, Tom La Porta:
Who, When, Where: Timeslot Assignment to Mobile Clients. 90-99
Session 2B: Mesh Networks
- Junfang Wang, Kan Cai, Dharma P. Agrawal:
A Multi-Rate Based Router Placement Scheme for Wireless Mesh Networks. 100-109 - Mohammad Nassiri, Fabrice Theoleyre, Martin Heusse, Andrzej Duda:
Molecular MAC for Multichannel Wireless Mesh Networks. 110-119 - Qin Xin, Fredrik Manne, Yan Zhang, Jianping Wang, Zeyu Zheng:
Almost Optimal Distributed M2M Multicasting in Wireless Mesh Networks. 120-129 - Pan Gun Park, Piergiuseppe Di Marco, Pablo Soldati, Carlo Fischione, Karl Henrik Johansson:
A Generalized Markov Chain Model For Effective Analysis of Slotted IEEE 802.15.4. 130-139
Session 3A: Application Systems and Testbeds I
- Yi-Tao Wang, Rajive L. Bagrodia:
Scalable Emulation of TinyOS Applications in Heterogeneous Network Scenarios. 140-149 - Raghuram S. Sudhaakar, Chunming Qiao, Seokhoon Yoon, Jia Zhao:
A MAC Protocol For Real-Time Sensing Applications Using Asymmetric Tranceivers. 150-159 - Jingtong Hu, Chun Xue, Yi He, Edwin Hsing-Mean Sha:
Reprogramming with Minimal Transferred Data on Wireless Sensor Network. 160-167
Session 3B: Routing Algorithm and Protocol I
- Mingming Lu, Jie Wu:
Erasure-Coding Based Utility Routing in Multi-hop Wireless Networks. 168-177 - Yang Zhang, Jing Zhao, Guohong Cao, Chita R. Das:
On Interest Locality in Content-Based Routing for Large-scale MANETs. 178-187 - Dhananjay Sampath, J. J. Garcia-Luna-Aceves:
Scalable Integrated Routing Using Prefix Labels and Distributed Hash Tables for MANETs. 188-198
Session 4A: Multi-channel, Multi-radio and MIMO
- Claudio Cicconetti, Vanessa Gardellin, Luciano Lenzini, Enzo Mingozzi:
PaMeLA: A Joint Channel Assignment and Routing Algorithm for Multi-Radio Multi-Channel Wireless Mesh Networks with Grid Topology. 199-207 - Yanyan Yang, Yunhuai Liu, Lionel M. Ni:
Level the Buffer Wall: Fair Channel Assignment in Wireless Sensor Networks. 208-216 - Shan Chu, Xin Wang:
Adaptive and Distributed Scheduling in Heterogeneous MIMO-based Ad hoc Networks. 217-226 - Miao Zhao, Yuanyuan Yang:
Packet Scheduling with Joint Design of MIMO and Network Coding. 227-236
Session 4B: Security and Privacy I
- Bo Zhu, Yanfei Zheng, Yaowei Zhou, Kefei Chen:
How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks. 237-245 - Matthias Gauger, Olga Saukh, Pedro José Marrón:
Enlighten Me! Secure Key Assignment in Wireless Sensor Networks. 246-255 - Hongbo Zhou, Matt W. Mutka, Lionel M. Ni:
Secure Autoconfiguration and Public-key Distribution for Mobile Ad-hoc Networks. 256-263 - Ying Huang, Wenbo He, Klara Nahrstedt:
ChainFarm: A Novel Authentication Protocol for High-rate Any Source Probabilistic Broadcast. 264-273
Session 5A: Cognitive Networks
- Cheng Wang, Shaojie Tang, Xiang-Yang Li, Changjun Jiang:
Multicast Capacity of Multihop Cognitive Networks. 274-283 - Ilario Filippini, Eylem Ekici, Matteo Cesana:
Minimum Maintenance Cost Routing in Cognitive Radio Networks. 284-293 - Qin Xin, Jie Xiang:
Joint QoS-aware Admission Control, Channel Assignment, and Power Allocation for Cognitive Radio Cellular Networks. 294-303 - Panlong Yang:
Cog Gap: A Cognitive and Opportunistic Gateway Access Algorithm in Wireless Mesh Networks. 304-312
Session 5B: Security and Privacy II
- Yun Wang, Weihuang Fu, Dharma P. Agrawal:
Intrusion Detection in Gaussian Distributed Wireless Sensor Networks. 313-321 - Zhendong Ma, Frank Kargl, Michael Weber:
Measuring location privacy in V2X communication systems with accumulated information. 322-331 - Jian Ren, Yun Li, Tongtong Li:
Providing Source Privacy in Mobile Ad Hoc Networks. 332-341 - Matthew Tan Creti, Matthew Beaman, Saurabh Bagchi, Zhiyuan Li, Yung-Hsiang Lu:
Multigrade Security Monitoring for Ad-Hoc Wireless Networks. 342-352
Session 6A: Data Aggregation and Fusion
- Xiang-Yang Li, XiaoHua Xu, ShiGuang Wang, Shaojie Tang, Guojun Dai, Jizhong Zhao, Yong Qi:
Efficient Data Aggregation in Multi-hop Wireless Sensor Networks under Physical Interference Model. 353-362 - Amitabha Amitava Ghosh, Özlem Durmaz Incel, Bhaskar Krishnamachari, Anil Vullikanti:
Multi-Channel Scheduling Algorithms for Fast Aggregated Convergecast in Sensor Networks. 363-372 - Miao Zhao, Yuanyuan Yang:
Bounded Relay Hop Mobile Data Gathering in Wireless Sensor Networks. 373-382
Session 6B: Power-awareness and Energy Efficiency I
- Yangfan Zhou, Junjie Xiong, Michael R. Lyu, Jiangchuan Liu, Kam-Wing Ng:
Energy-efficient On-demand Active Contour Service for Sensor Networks. 383-392 - Khoriba Ghada, Jie Li, Yusheng Ji, Guojun Wang:
Cross-layer Approach for Energy Efficient Routing in WANETs. 393-402 - Dajin Wang:
An Analytical Study of Subdividing Hexagon-Clustered WSN for Power Saving. 403-412
Session 7A: Delay Tolerant Networks
- Cong Liu, Jie Wu, Ionut Cardei:
Message Forwarding in Cyclic MobiSpace: the Multi-copy Case. 413-422 - Ramon Serna Oliver, Gerhard Fohler:
Probabilistic Estimation of End-to-End Path Latency in Wireless Sensor Networks. 423-431 - Xueli An, Ramin Hekmat:
Probabilistic-based Message Dissemination in Ad-Hoc and Sensor Networks using Directional Antennas. 432-438
Session 7B: Power-awareness and Energy Efficiency II
- Guanfeng Liang, Nitin H. Vaidya:
Cooperation Helps Power Saving. 439-447 - Jonathan Tate, Iain Bate:
An Improved Lightweight Synchronisation Primitive For Sensornets. 448-457 - Qianqian Ren, Jianzhong Li, Hong Gao:
TPSS: A Two-phase Sleep Scheduling Protocol for Object Tracking in Wireless Sensor Networks. 458-465
Session 8A: Coverage and Connectivity
- Xu Li, Hannes Frey, Nicola Santoro, Ivan Stojmenovic:
Focused-Coverage by Mobile Sensor Networks. 466-475 - Xiaole Bai, Lei Ding, Jin Teng, Changqing Xu, Dong Xuan:
Directed Coverage in Wireless Sensor Networks: Concept and Quality. 476-485 - Yu Gu, Jie Li, Baohua Zhao, Yusheng Ji:
Target Coverage Problem in Wireless Sensor Networks: A Column Generation Based Approach. 486-495 - Chris Yu-Tak Ma, David K. Y. Yau, Nung Kwan Yip, Nageswara S. V. Rao, Jiming Chen:
Performance Analysis of Stochastic Network Coverage with Limited Mobility. 496-505
Session 8B: Multicast and Broadcast
- Cheng Zhan, Yinlong Xu, Jianping Wang, Victor C. S. Lee:
Reliable Multicast in Wireless Networks Using Network Coding. 506-515 - Zheng Li, Deying Li:
Interference and Power Constrained Broadcasting and Multicasting in Wireless Ad Hoc Networks with Directional Antennas. 516-525 - Peng-Jun Wan, Lixin Wang, Ophir Frieder:
Fast Group Communications in Multihop Wireless Networks Subject to Physical Interference. 526-533 - Ming Li, Wenjing Lou, Kai Zeng:
OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links. 534-543
Session 9A: Application Systems and Testbeds II
- Yuan Yuan, Shanshan Li, Kui Wu, Weijia Jia, Yuxing Peng:
FOCUS: A Cost-Effective Approach for Large-Scale Crop Monitoring with Sensor Networks. 544-553 - Wei Dong, Chun Chen, Xue Liu, Jiajun Bu, Yunhao Liu:
Dynamic Linking and Loading in Networked Embedded Systems. 554-562 - Scott Pudlewski, Tommaso Melodia:
DMRC: Distortion-Minimizing Rate Control for Wireless Multimedia Sensor Networks. 563-572
Session 9B: Routing Algorithm and Protocol II
- Oday D. Jerew, Haley M. Jones, Kim L. Blackmore:
On the Minimum Number of Neighbours for Good Routing Performance in MANETs. 573-582 - Stephen Dabideen, J. J. Garcia-Luna-Aceves:
OWL: Towards Scalable Routing in MANETs Using Depth-First Search On Demand. 583-592 - Tao Chen, Deke Guo, Xue Liu, Honghui Chen, Xueshan Luo, Junxian Liu:
BDP: A Bloom Filters Based Dissemination Protocol in Wireless Sensor Networks. 593-602
InVANET Workshop
- Eugenio Giordano, Raphaël Frank, Abhishek Ghosh, Giovanni Pau, Mario Gerla:
Two Ray or not Two Ray this is the price to pay. 603-608 - Gongjun Yan, Danda B. Rawat, Samy El-Tawab:
Ticket-based Reliable Routing in VANET. 609-614 - Ching-Ling Huang, Yaser Pourmohammadi Fallah, Raja Sengupta:
Analysis of Aggregated Power Level and Rate-Power Control Designs for Status Update Messages in VANETs. 615-620 - Eun-Kyu Lee, Sungwon Yang, Soon-Young Oh, Mario Gerla:
RF-GPS: RFID Assisted Localization in VANETs. 621-626 - Samy El-Tawab, Mahmoud Abuelela, Gongjun Yan:
Real-Time Weather Notification System using Intelligent Vehicles and Smart Sensors. 627-632 - Hongyu Huang, Minjie Zhu, Minglu Li, Xu Li, Min-You Wu, Linghe Kong:
LICP: A Look-ahead Intersection Control Policy with Intelligent Vehicles. 633-638
MeshTech Workshop
- Pranjal Pandey, Sethuraman Satish, Joy Kuri, Haresh Dagale:
Design & Implementation of IEEE 802.11s Mesh Nodes with Enhanced Features. 639-644 - Qizhi Cao, Tianji Li, Douglas J. Leith:
Achieving Fairness in Lossy 802.11e Wireless Multi-Hop Mesh Networks. 645-650 - Andrey I. Lyakhov, Ivan Pustogarov, Alexander A. Safonov, Mikhail Yakimov:
Starvation Effect Study in IEEE 802.11 Mesh Networks. 651-656 - Leonardo Badia:
Evaluation of a Potential Energy Methodology for Joint Routing and Scheduling in Wireless Mesh Networks. 657-662 - Raffaele Bruno, Vania Conan, Stéphane Rousseau:
Route Selection for Capacity Maximization in Multi-Rate TDMA-based Wireless Ad Hoc Networks. 663-669 - Yanhua Li, Wei Chen, Zhi-Li Zhang:
Optimal Forwarder List Selection in Opportunistic Routing. 670-675 - Chia-Sheng Chou, Chien Chen, Ying-Yu Chen, Rong-Hong Jan, Cheng-Chung Hsieh:
Multicast Routing and Channel Assignment in Wireless Mesh Networks. 676-681 - Chengxuan He, Oliver Yang, Guoqiang Wang:
Performance Evaluation of a WiMAX Multi-Hop Relay System to Support Multicast/Broadcast Service. 682-687 - Tzu-Chieh Tsai:
Quality-Aware Multiple Backbone Construction on Multi-interface Wireless Mesh Networks for P2P Streaming. 688-693
TSP Workshop
- Michael Smit, Kelly A. Lyons, Michael McAllister, Jacob Slonim:
Detecting Privacy Infractions in Applications: A Framework and Methodology. 694-701 - Yinan Shan, Zhenfu Cao:
Extended Attribute Based Encryption for Private Information Retrieval. 702-707 - Cong Zheng, Lansheng Han, Jihang Ye, Mengsong Zou, Qiwen Liu:
A Fuzzy Comprehensive Evaluation Model for Harms of Computer Virus. 708-713 - Yasuo Hatano, Kunihiko Miyazaki, Toshinobu Kaneko:
A Study on Read-Write Protection of a Digital Document by Cryptographic Techniques. 714-721 - Fuwen Liu, Hartmut König:
Security Considerations on Pervasive Real-time Collaboration. 722-727 - Zhiqiang Wei, Wei Zhou, Mijun Kang, Michael Collins, Paddy Nixon:
A Strategy-proof Trust Mechanism for Pervasive Computing Environments. 728-731 - Manmeet Mahinderjit Singh, Xue Li:
Computational Model for Trust Management in RFID Supply Chains. 734-740 - Hossein Rezaei Ghaleh, Siavash Khorsandi:
A New High-Performance Approach for Offline Replacement Attack Prevention in Trusted Clients. 741-746 - YongQing Ni, DaeHun Nyang, Xu Wang:
A-Kad: an anonymous P2P protocol based on Kad network. 747-752 - Anoosha Prathapani, Lakshmi Santhanam, Dharma P. Agrawal:
Intelligent Honeypot Agent for Blackhole Attack Detection in Wireless Mesh Networks. 753-758 - Xiyuan Chen, Miaoliang Zhu:
A Directed Acyclic Graph based Detection for RBAC Based Secure. 759-764 - Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
RPROB - A Family of Binomial-Mix-based Anonymous Communication Systems. 765-770 - Ruidong Li, Jie Li:
Towards Neutral Trust Management Framework in Unstructured Networks. 771-776 - Do Van Thanh, Ivar Jørstad, Tore E. Jønvik, Do van Thuan:
Strong authentication with mobile phone as security token. 777-782 - Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan:
Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity. 783-789 - Lina Wang, Yuntao Yue, Chi Guo, Xiaoying Zhang:
Design of a Trust Model and Finding Key-Nodes in Rumor Spreading Based on Monte-Carlo Method. 790-795 - Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård:
Requirements for Evidential Value for the Assessment of the Trustworthiness of Digital Records over Time. 796-803 - Gongjun Yan, Stephan Olariu:
An Efficient Geographic Location-based Security Mechanism for Vehicular Adhoc Networks. 804-809 - Habtamu Abie:
Adaptive Security and Trust Management for Autonomic Message-Oriented Middleware. 810-817 - Jihoon Cho:
Strengthening Class1 Gen2 RFID Tags. 818-824 - Meng Wang, Yi Wang, Duo Liu, Zili Shao:
Improving the Reliability of Embedded Systems with Cache and SPM. 825-830 - Deen Zheng, Zhengwei Qi, Alei Liang, Hongbo Yang, Haibing Guan, Liang Liu:
A Heuristic Policy-based System Call Interposition in Dynamic Binary Translation. 831-835 - Do Van Thanh, Ivar Jørstad, Tor Anders Johansen, Elias Bakken, Do van Thuan:
Pervasive Service Access with SIM-based VPN. 836-841 - Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
QoS-aware Optimization Strategy for Security Ranking in SSL Protocol. 842-847 - Kanthakumar Pongaliur, Li Xiao, Alex X. Liu:
CENDA-Camouflage Event Based Malicious Node Detection Architecture. 848-855 - Mohammed Benaissa, Tim Good:
A Low-Frequency RFID to Challenge Security and Privacy Concerns. 856-863 - Yingpei Zeng, Jiannong Cao, Jue Hong, Li Xie:
Secure localization and location verification in wireless sensor networks. 864-869
WAASN Workshop
- Sheng Wang, Xue Wang, Yong Wang, Xinyao Sun:
Distributed Lightweight Target Tracking for Wireless Sensor Networks. 870-875 - Weiwei Fang, Xin Zhao, Tianshu Chu, Yuan An, Yi Liu, Depei Qian:
RRDD: Receiver-oriented Robust Data Delivery in Mobile Sensor Networks. 876-881 - YingZhi Zeng, Xia Yan, Jinshu Su:
A new broadcast-Key Management Scheme for Distributed Wireless Sensor Networks. 882-887 - Neda Edalat, Wendong Xiao, Chen-Khong Tham, Ehsan Keikha, Lee-Ling S. Ong:
A Price-based Adaptive Task Allocation for Wireless Sensor Network. 888-893 - Min-You Wu:
Anti-Sensornet: Intruders and Countermeasures. 894-899 - Zhi Li, Yanmin Zhu, Minglu Li:
Practical Location-based Routing Protocol in Vehicular Ad Hoc Networks. 900-905 - Jiehui Chen, Mitsuji Matsumoto:
EUCOW: Energy-Efficient Boundary Monitoring for Unsmoothed Continuous Objects in Wireless Sensor Network. 906-911
WiNA Workshop
- Yi Gu, Qishi Wu, Xiaoshan Cai, Jeremy Bond:
On Efficient Deployment of High-end Sensors in Large-scale Heterogeneous WSNs. 912-917 - Zhengbao Li, Zhongwen Guo, Haipeng Qu, Feng Hong, Pengpeng Chen, Meng Yang:
UD-TDMA: A Distributed TDMA Protocol for Underwater Acoustic Sensor Network. 918-923 - Yuanfang Chen, Mingchu Li, Lei Wang, Zhuxiu Yuan, Weiping Sun, Chunsheng Zhu, Ming Zhu, Lei Shu:
A Proportional Fair Backoff Scheme for Wireless Sensor Networks. 971-976 - Wen Ouyang, Ying Tsao:
A High-Accuracy Real-Time Localization Algorithm for Wireless Sensor Networks. 924-928 - Xinqing Yan:
An Enhanced Query Tree Protocol for RFID Tag Collision Resolution with Progressive Population Estimation. 935-940 - Panlong Yang:
On Channel Usability of Wireless Mesh Networks -- When Stability Plays With You. 941-946 - Xin Liu, Wenjun Zeng:
Throughput and Delay Analysis of the IEEE 802.15.3 CSMA/CA Mechanism. 947-952 - Hossam Fattah, Hussein M. Alnuweiri:
A Cross-Layer Design for Dynamic Resource Block Allocation in 3G Long Term Evolution System. 929-934 - Qingsong Yao, Yong Qi, Jizhong Zhao, Jinsong Han:
An Enhanced Synchronization Approach for RFID Private Authentication. 959-964 - Ahmed Jeddah, Nejib Zaguia, Guy-Vincent Jourdan:
A Note on the Study of Bluetooth Networks' Distributed Algorithms. 953-958 - Chuan-Ming Liu:
A kNN Search Protocol Using a Voronoi Diagram in Wireless Broadcast Environments. 965-970 - Chao Ren, XuFei Mao, Ping Xu, Guojun Dai, Zhanhuai Li:
Delay and Energy Efficiency Tradeoffs for Data Collections in Large Scale Wireless Sensor Networks. 977-982 - Liang-Che Wei, Chih-Wei Kang, Jian-Hung Chen:
A Force-Driven Evolutionary Approach for Multi-objective 3D Differentiated Sensor Network Deployment. 983-988
WSNS Workshop
- YingZhi Zeng, Xia Yan, Jinshu Su:
A new Group Key Management Scheme based on DMST for Wireless Sensor Networks. 989-994 - Shahid Raza, Thiemo Voigt, Adriaan Slabbert, Krister Landernäs:
Design and Implementation of a Security Manager for WirelessHART Networks. 995-1004 - Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere:
A Per-Hop Security Scheme for Highly Dynamic Wireless Sensor Networks. 1005-1011 - Xudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, Dong Xuan:
DiffUser: Differentiated User Access Control on Smartphone. 1012-1017 - Jianmin Chen, Jie Wu:
cooperative anonymity authentication in vehicular networks. 1018-1023 - Jungshian Li, ChingFang Yang:
Quantum Communication in Distributed Wireless Sensor Networks. 1024-1029 - Zhijun Li, Guang Gong:
Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networks. 1030-1035 - Feng Cheng, Xiaolong Yin, Reinhard German, Falko Dressler:
Performance Impact of and Protocol Interdependencies of IEEE 802.15.4 Security Mechanisms. 1036-1041 - Kai Shi, Yantai Shu, Oliver W. W. Yang, Chunfeng Liu:
A Principal-Agent Method to Prevent Selfish MAC Layer Behavior in Wireless Networks. 1042-1047 - Levente Buttyán, Tamás Holczer:
Private Cluster Head Election in Wireless Sensor Networks. 1048-1053 - Yingpei Zeng, Jiannong Cao, Jue Hong, Shigeng Zhang, Li Xie:
SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor Networks. 1054-1059
Demos
- Joakim Eriksson, Fredrik Österlind, Thiemo Voigt, Niclas Finne, Shahid Raza, Nicolas Tsiftes, Adam Dunkels:
Accurate Power Profiling of Sensornets with the COOJA/MSPSim Simulator. 1060-1061 - Huang-Chen Lee, Chuan-Yu Cho, Chung-Ta King, Yao-Min Fang, Bing-Jean Lee:
Design and implementation of non-autonomous mobile wireless sensor for debris flow monitoring. 1062-1064 - Andong Zhan, Shen Li, Tao Li, Lubin Guan, Panlong Yang, Xiaobing Wu, Guihai Chen:
iTracking: Accurate Light-based Location-tracking in Wireless Sensor Networks. 1065-1067 - Frederik Hermans, Norman Dziengel, Jochen H. Schiller:
Quality Estimation based Data Fusion in Wireless Sensor Networks. 1068-1070 - Lien-Wu Chen, Kun-Ze Syue, Yu-Chee Tseng:
VS3: A Vehicular Surveillance and Sensing System for Security Applications. 1071-1073 - Jun Zeng, Daoyong Liu, Alei Liang, Haibing Guan:
Pattern Formation Using Multiple Robots. 1074-1076
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.