Sensory-based motion planning with global proofs
I Kamon, E Rivlin - IEEE transactions on Robotics and …, 1997 - ieeexplore.ieee.org
We present DistBug, a new navigation algorithm for mobile robots which exploits range data.
The algorithm belongs to the Bug family, which combines local planning with global …
The algorithm belongs to the Bug family, which combines local planning with global …
A denial of service attack method for an iot system
L Liang, K Zheng, Q Sheng… - 2016 8th international …, 2016 - ieeexplore.ieee.org
In recent years, Internet of things (IoT) is widely used in various domains. However, the
security of the IoT system becomes a challenge. If the IoT system is attacked, a great …
security of the IoT system becomes a challenge. If the IoT system is attacked, a great …
A handshake protocol with unbalanced cost for wireless updating
Wireless updating is an essential method to update system files or fix bugs in Internet of
Things (IoT) devices. A significant and challenging problem in wireless updating is security …
Things (IoT) devices. A significant and challenging problem in wireless updating is security …
OpenFunction for software defined IoT
The recent surge in the prosperity of the Internet of Things (IoT) has been attracting an
increasing number of researchers and experts with great attention due to its significant …
increasing number of researchers and experts with great attention due to its significant …
Applying docker swarm cluster into software defined internet of things
Y Gao, H Wang, X Huang - 2016 8th International Conference …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), cloud computing and integrated deployment are becoming central
topics in Internet development. In this paper, a cloud containerization solution, Docker, has …
topics in Internet development. In this paper, a cloud containerization solution, Docker, has …
Time-optimized management of IoT nodes
K Kolomvatsos - Ad Hoc Networks, 2018 - Elsevier
The vision of Internet of Things (IoT) aims to offer a vast infrastructure of numerous
interconnected devices usually called IoT nodes. The infrastructure consists of the basis of …
interconnected devices usually called IoT nodes. The infrastructure consists of the basis of …
SFIOT: Software-Defined Function for the IoT
Wireless reprogramming is a significant yet challenging issue in the Internet of Things (IoT).
Existing methods designed for wireless sensor networks (WSN) are inadequate for IoT …
Existing methods designed for wireless sensor networks (WSN) are inadequate for IoT …
Model checking of IoT system in microgrid
L Liang, K Zheng, Z Wei, Y Wang… - 2016 8th International …, 2016 - ieeexplore.ieee.org
Due to the serious air pollution, the renewable energy sources had attracted more and more
attention. In order to manage the renewable energy sources, the concept of microgrid is …
attention. In order to manage the renewable energy sources, the concept of microgrid is …
[图书][B] Authenticated Key Exchange Protocols with Unbalanced Computational Requirements
J Zhang - 2018 - search.proquest.com
Security is a significant problem for communications in many scenarios in Internet of Things
(IoT), such as military applications, electronic payment, wireless reprogramming of smart …
(IoT), such as military applications, electronic payment, wireless reprogramming of smart …
A Location-based Blockchain Evidence Preservation Wireless Communitication Scheme for HuaTaiYiMei v Tongdao Technology Development Case
B Chen, X Huang, F Liu, H Yin - 2021 4th International …, 2021 - ieeexplore.ieee.org
HuaTaiYiMei v Tongdao Technology Development case was heard by Hangzhou Internet
Court on March 15th, 2018. The court ruled in favour of HuaTai and awarded monetary …
Court on March 15th, 2018. The court ruled in favour of HuaTai and awarded monetary …