Intersensor Collaboration in Distributed Quantization Networks
نویسندگان
چکیده
منابع مشابه
On Supporting Distributed Collaboration in Sensor Networks
In sensor networks, nodes may malfunction due to the hostile environment. Therefore, dealing with node failure is a very important research issue. In this paper, we study distributed cooperative failure detection techniques. In the proposed techniques, the nodes around a suspected node collaborate with each other to reach an agreement on whether the suspect is faulty or malicious. We first form...
متن کاملBridging Social and Awareness Networks in Distributed Research Collaboration
Awareness plays multiple, critical roles in the initiation and sustenance of research collaborations. Potential collaborators must first be aware of each other and their respective skills so that they can meet to discuss potential projects and begin collaborating. This type of awareness is the traditional domain of transactive memory and other theories of knowledge in organizations. Once people...
متن کاملDistributed Collaboration
This chapter scopes out the subject of our study. It defines and motivates the field of distributed collaboration. It shows how this field relates to virtual reality, distributed, real-time and mobile computing, databases, security, and various subfields of artificial intelligence – natural language understanding, agents, machine learning/data-mining, and computer vision. It gives an overview o...
متن کاملResilience-Based Framework for Distributed Generation Planning in Distribution Networks
Events with low probability and high impact, which annually cause high damages, seriously threaten the health of the distribution networks. Hence, more attention to the issue of enhancing network resilience and continuity of power supply, feels more than ever, all over the world. In modern distribution networks, because of the increasing presence of distributed generation resources, an alternat...
متن کاملDistributed estimation and quantization
There are three important consequences from Theorem 6. Corollary 1: If Construction C is applied on the extended Hamming code of length 2”, we obtain an abnotmal (2”, 3)2 code. CoroZlary2: If Construction C is applied on the punctured Preparata code of length 2’”-1, we obtain an abnormal (2’”-1, 4)3 code. Corollary 3: If Construction C is applied on the Preparata code of length 22m, we obtain a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Communications
سال: 2013
ISSN: 0090-6778
DOI: 10.1109/tcomm.2013.071813.120833