Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Thomas A. Babbitt"'
Autor:
H. Moore, Suzanne J. Matthews, Cullen D. Johnson, Thomas A. Babbitt, Nikhil Shyamkumar, Preston C. Haney, Emmet D. Dunham, Brian H. Curtin, Rachelle H. David
Publikováno v:
UEMCON
Wireless sensor networks play an important role for perimeter monitoring in remote environments. While commercial wireless sensor networks for providing audio-visual monitoring exist, they are often expensive to deploy. In this paper, we describe and
Publikováno v:
SIGITE
Maximizing student retention of, and ability to apply, technical material in introductory information technology courses is a complex task, especially with respect to the general student population. This population struggles with the application of p
Autor:
Nikhil Shyamkumar, Cullen D. Johnson, Emmet D. Dunham, Thomas A. Babbitt, Suzanne J. Matthews, Brian H. Curtin, Rachelle H. David
Publikováno v:
HotSoS
Scientists and the military need unobtrusive methods of observing wildlife. In this poster, we assess the feasibility of a Raspberry Pi sensor network for wildlife detection and monitoring. While technology for wildlife observation such as camera tra
Publikováno v:
SIGCSE
There is an immense interest in teaching computer science concepts- and programming specifically - to everyone. The United States Military Academy at West Point has required every student, regardless of major, to pass a computer science zero (CS0) co
Publikováno v:
INFOCOM Workshops
There is a growing need for secure and robust networks that function in austere environments or with nodes that have limited resources. The prime example is Delay Tolerant Networks that have military, first response, infrastructure failure and vehicl
Publikováno v:
IEEE Security & Privacy Magazine. 9:56-59
Information security educators can learn much from the hacker community. The word "hacker" is controversial, and the idea of emulating this community is problematic to some. However, we use the term in its purest form: individuals who creatively expl
Publikováno v:
Computer Communications. 31:3799-3809
Routing protocols for wireless sensor networks face two challenges. One is an efficient bandwidth usage which requires minimum delay between transfers of packets. Establishing permanent routes from the source to destination addresses this challenge s
Publikováno v:
ICC
There is a need for robust networks in all environments including austere ones. The prime example is Delay Tolerant Networks (DTN) that are subject to a growing body of research. These networks support applications used by the military and first resp
Publikováno v:
ISCC
Routing protocols for Wireless Sensor Networks (WSN) face three major performance challenges. The first one is an efficient use of bandwidth that minimizes the transfer delay of packets between nodes to ensure the shortest end-to-end delay for packet