Sciweavers

1022 search results - page 60 / 205
» Challenges for Constraint Programming in Networking
Sort
View
115
Voted
ICRA
2005
IEEE
156views Robotics» more  ICRA 2005»
15 years 6 months ago
A Hierarchical Multiple-Target Tracking Algorithm for Sensor Networks
Abstract— Multiple-target tracking is a canonical application of sensor networks as it exhibits different aspects of sensor networks such as event detection, sensor information f...
Songhwai Oh, Luca Schenato, Shankar Sastry
107
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
SlideOR: Online Opportunistic Network Coding in Wireless Mesh Networks
—Opportunistic routing significantly increases unicast throughput in wireless mesh networks by effectively utilizing the wireless broadcast medium. With network coding, opportun...
Yunfeng Lin, Ben Liang, Baochun Li
NN
1998
Springer
15 years 7 days ago
Serial processing in human movement production
Abstract— This paper presents a study on exploiting the redundancy of a seven-link manipulator to evolve obstacle avoidance skill at the elbow, subjected to endeffector working ...
Joseph A. Doeringer, Neville Hogan
86
Voted
KIVS
2005
Springer
15 years 6 months ago
Reconfigurable consumer direct logistics systems
Abstract: The goals of the interdisciplinary project HORN were as well to improve competitiveness of service providers that deliver grocery items as to develop new hardware and sof...
Sébastien Truchat, Alexander Pflaum
111
Voted
PERCOM
2007
ACM
16 years 5 days ago
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment
? Peer-to-peer is a popular distributed system. With the advancement in mobile technologies, mobile p2p has revealed its attraction. But, the resource constraints such as bandwidth...
Dewan Tanvir Ahmed, Shervin Shirmohammadi