Sciweavers

1791 search results - page 351 / 359
» Behavioral Operations
Sort
View
121
Voted
BIRTHDAY
2010
Springer
15 years 24 days ago
The Architecture Description Language MoDeL
m, modules, types and operations), different kinds of abstractions (functional/data, types/objects etc.) without falling into a loose collection of diagram languages. Considering a...
Peter Klein
83
Voted
ICRA
2010
IEEE
121views Robotics» more  ICRA 2010»
15 years 10 days ago
Real-world validation of three tipover algorithms for mobile robots
— Mobile robot tipover is a concern as it can create dangerous situations for operators and bystanders, cause collateral damage to the surrounding environment, and result in an a...
Philip R. Roan, Aaron Burmeister, Amin Rahimi, Kev...
125
Voted
IJHPCA
2010
105views more  IJHPCA 2010»
15 years 9 days ago
A Pipelined Algorithm for Large, Irregular All-Gather Problems
We describe and evaluate a new, pipelined algorithm for large, irregular all-gather problems. In the irregular all-gather problem each process in a set of processes contributes in...
Jesper Larsson Träff, Andreas Ripke, Christia...
INFOCOM
2010
IEEE
15 years 9 days ago
Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing
—Delay Tolerant Networks (DTN) are networks of self-organizing wireless nodes, where end-to-end connectivity is intermittent. In these networks, forwarding decisions are generall...
Theus Hossmann, Thrasyvoulos Spyropoulos, Franck L...
88
Voted
IOR
2010
75views more  IOR 2010»
15 years 9 days ago
Confronting Entrenched Insurgents
During counterinsurgency operations, government forces with superior …repower confront weaker lowsignature insurgents. Under what conditions should government (Blue) forces atta...
Edward H. Kaplan, Moshe Kress, Roberto Szechtman