Sciweavers

1855 search results - page 164 / 371
» A coding theorem for distributed computation
Sort
View
142
Voted
DSOM
2000
Springer
15 years 7 months ago
Evaluation of Constrained Mobility for Programmability in Network Management
In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobilit...
Christos Bohoris, Antonio Liotta, George Pavlou
CORR
2010
Springer
116views Education» more  CORR 2010»
15 years 3 months ago
Where are the hard manipulation problems?
One possible escape from the Gibbard-Satterthwaite theorem is computational complexity. For example, it is NP-hard to compute if the STV rule can be manipulated. However, there is...
Toby Walsh
CVPR
2004
IEEE
16 years 5 months ago
3D Facial Tracking from Corrupted Movie Sequences
In this paper we perform 3D face tracking on corrupted video sequences. We use a deformable model, combined with a predictive filter, to recover both the rigid transformations and...
Siome Goldenstein, Christian Vogler, Dimitris N. M...
127
Voted
ICPP
2005
IEEE
15 years 9 months ago
Connected k-Hop Clustering in Ad Hoc Networks
In wireless ad hoc networks, clustering is one of the most important approaches for many applications. A connected k-hop clustering network is formed by electing clusterheads in k...
Shuhui Yang, Jie Wu, Jiannong Cao
CONCUR
2001
Springer
15 years 8 months ago
Compositional Modeling of Reactive Systems Using Open Nets
In order to model the behaviour of open concurrent systems by means of Petri nets, we introduce open Petri nets, a generalization of the ordinary model where some places, designate...
Paolo Baldan, Andrea Corradini, Hartmut Ehrig, Rei...