Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Xu, Ning
ERICSSON INC
SAN JOSE, California
  Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 9 of 9 reviews

   
  Safe autonomy under perception uncertainty using chance-constrained temporal logic
Jha S., Raman V., Sadigh D., Seshia S. Journal of Automated Reasoning 60(1): 43-62, 2018.  Type: Article

The topic of self-driving cars is receiving a lot of press lately. This paper on safe autonomy is an interesting read for people researching autonomous vehicles or more generally autonomous control systems. While the authors provide re...

Jan 17 2019  
  Recovery from simultaneous failures in a large scale wireless sensor network
Chouikhi S., El Korbi I., Ghamri-Doudane Y., Azouz Saidane L. Ad Hoc Networks 67 68-76, 2017.  Type: Article

Wireless sensor networks (WSNs) are an appealing choice for applications such as environmental monitoring due to the capability to deploy massive amounts of cheaper sensor nodes and manage them in a distributed fashion. An important pr...

Feb 14 2018  
  Robust adaptive neural network-based trajectory tracking control approach for nonholonomic electrically driven mobile robots
Boukens M., Boukabou A., Chadli M. Robotics and Autonomous Systems 92 30-40, 2017.  Type: Article

This is not your casual weekend read....

Jan 10 2018  
  Location-based address configuration for 6LoWPAN wireless sensor networks
Wang X., Le D., Cheng H., Yao Y. Wireless Networks 21(6): 2019-2033, 2015.  Type: Article

Connecting wireless sensor networks (WSNs) to the Internet is a very interesting topic. As useful as WSNs are, they used to be constrained in a separate compartment of the network. The collected data needs to be hauled in by a base sta...

Nov 22 2016  
  Soft computing-based localizations in wireless sensor networks
So-In C., Permpol S., Rujirakul K. Pervasive and Mobile Computing 29(C): 17-37, 2016.  Type: Article

The world is transitioning to the 5G era. 5G involves more than simply upgrading to “better” radios in the network. The Internet of Things (IoT) is part of the biggest plans 5G has for us. The IoT is to have various...

Oct 3 2016  
  Ear-phone: a context-aware noise mapping using smart phones
Rana R., Chou C., Bulusu N., Kanhere S., Hu W. Pervasive and Mobile Computing 17, Part A1-22, 2015.  Type: Article

Crowdsourcing is a hot topic. Many individuals hold massive processing power in their hands. Ear-phone is an interesting proof-of-concept project. It shows how smartphones from the general public can collectively contribute to public w...

Jul 19 2016  
  Residual energy-based adaptive data collection approach for periodic sensor networks
Makhoul A., Harb H., Laiymani D. Ad Hoc Networks 35(C): 149-160, 2015.  Type: Article

Wireless sensor networks (WSNs) are a key technology in the big data age. Deployed sensors, equipped with wireless communication capabilities, collect massive data from remote or even hostile environments. They transmit the data to a c...

Jun 23 2016  
  Linux XIA: an interoperable meta network architecture to crowdsource the future Internet
Machado M., Doucette C., Byers J.  ANCS 2015 (Proceedings of the 11th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, Oakland, CA, May 7-8, 2015) 147-158, 2015.  Type: Proceedings

The Internet becomes increasingly available each day. Access to it in a variety of forms posts challenges to the traditional design of the Internet protocol (IP). This inspiring paper introduces the Linux kernel-based XIA. What is XIA ...

May 18 2016  
  Comprehensive event based estimation of sensor node distribution strategies using classical flooding routing protocol in wireless sensor networks
Verma V., Singh S., Pathak N. Wireless Networks 20(8): 2349-2357, 2014.  Type: Article

How does one evaluate the performance of the classic flooding routing protocol in wireless sensor networks? This paper suggests using sense count, receive count, and receive redundant count as metrics. The protocol performance is affec...

Jun 11 2015  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy