Sciweavers

5456 search results - page 376 / 1092
» A study of Object Evolution
Sort
View
INFOCOM
2009
IEEE
15 years 11 months ago
Absence of Evidence as Evidence of Absence: A Simple Mechanism for Scalable P2P Search
Abstract—We propose a novel search mechanism for unstructured p2p networks, and show that it is both scalable, i.e., it leads to a bounded query traffic load per peer as the pee...
Stratis Ioannidis, Peter Marbach
IWPC
2009
IEEE
15 years 11 months ago
Intensions are a key to program comprehension
The classical comprehension theories study relations between extensions, intensions, and names. Originally developed in linguistics and mathematics, these theories are applicable ...
Václav Rajlich
ADHOCNETS
2009
Springer
15 years 11 months ago
Enhancement of Self-organisation in Wireless Networking through a Cross-Layer Approach
Self-organisation has emerged as a very promising approach to the design, deployment, operation, control and evolution of complex wireless networks. The dominant strictly layered d...
Mohammad Abdur Razzaque, Simon A. Dobson, Paddy Ni...
ICCS
2009
Springer
15 years 11 months ago
A Second Order Adjoint Method to Targeted Observations
The role of the second order adjoint in targeting strategies is studied and analyzed. Most targeting strategies use the first order adjoint to identify regions where additional in...
Humberto C. Godinez, Dacian N. Daescu
CDC
2008
IEEE
119views Control Systems» more  CDC 2008»
15 years 11 months ago
A set-membership approach to consensus problems with bounded measurement errors
— This paper analyzes two classes of consensus algorithms in presence of bounded measurement errors. The protocols taken into account adopt an updating rule based either on const...
Andrea Garulli, Antonio Giannitrapani