Learn More
We develop distributed algorithms for self-organizing sensor networks that respond to directing a target through a region. The sensor network models the danger levels sensed across its area and has the ability to adapt to changes. It represents the dangerous areas as obstacles. A protocol that combines the artificial potential field of the sensors with the(More)
Plants must effectively defend against biotic and abiotic stresses to survive in nature. However, this defense is costly and is often accompanied by significant growth inhibition. How plants coordinate the fluctuating growth-defense dynamics is not well understood and remains a fundamental question. Jasmonate (JA) and gibberellic acid (GA) are important(More)
—In a dynamic spectrum access (DSA) network, communication rendezvous is the first step for two secondary users to be able to communicate with each other. In this step, the pair of secondary users meet on the same channel, over which they negotiate on the communication parameters, to establish the communication link. This paper presents ETCH, Efficient(More)
The corticospinal system undergoes important postnatal development, leading to the mature topography and specificity of connections. The purpose of this study was to determine the time-course of development of corticospinal axonal branching and varicosity density within the cervical gray matter. Corticospinal neurons were labeled after small injections of(More)
An ad-hoc network is formed by a group of mobile hosts upon a wireless network interface. Previous research in this area has concentrated on routing algorithms which are designed for fully connected networks. The usual way to deal with a disconnected ad-hoc network is to let the mobile computer wait for network reconnection passively, which may lead to(More)
Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right due to the access restriction implicated by the data security and confidentiality. Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can(More)
As RFID tags are increasingly attached to everyday items, it quickly becomes impractical to collect data from every tag in order to extract useful information. In this paper, we consider the problem of identifying popular categories of RFID tags out of a large collection of tags, without reading all the tag data. We propose two algorithms based on the idea(More)