Sciweavers

5948 search results - page 1040 / 1190
» Computing Robust Counter-Strategies
Sort
View
ICRA
2002
IEEE
151views Robotics» more  ICRA 2002»
15 years 8 months ago
Protocols for Collaboration, Coordination and Dynamic Role Assignment in a Robot Team
—Creation of cooperative robot teams for complex tasks requires not only agents that can function well individually but also agents that can coordinate their actions. This paper ...
Rosemary Emery, Kevin Sikorski, Tucker R. Balch
98
Voted
IEEEMSP
2002
IEEE
15 years 8 months ago
Factorization with missing data for 3D structure recovery
—Matrix factorization methods are now widely used to recover 3D structure from 2D projections [1]. In practice, the observation matrix to be factored out has missing data, due to...
Rui F. C. Guerreiro, Pedro M. Q. Aguiar
INFOCOM
2002
IEEE
15 years 8 months ago
Adaptive Load Sharing for Network Processors
—A novel scheme for processing packets in a router is presented that provides load sharing among multiple network processors distributed within the router. It is complemented by ...
Lukas Kencl, Jean-Yves Le Boudec
P2P
2002
IEEE
147views Communications» more  P2P 2002»
15 years 8 months ago
Building a P2P Forum System with JXTA
Decentralized file-sharing systems like Napster [11] and Gnutella [23] have popularized the peer-to-peer approach [18,20,22], which emphasizes the use of distributed resources in ...
Emir Halepovic, Ralph Deters
GECCO
2010
Springer
150views Optimization» more  GECCO 2010»
15 years 8 months ago
Object-level recombination of commodity applications
This paper presents ObjRecombGA, a genetic algorithm framework for recombining related programs at the object file level. A genetic algorithm guides the selection of object file...
Blair Foster, Anil Somayaji
« Prev « First page 1040 / 1190 Last » Next »