Sciweavers

5948 search results - page 1156 / 1190
» Computing Robust Counter-Strategies
Sort
View
DATE
2007
IEEE
156views Hardware» more  DATE 2007»
15 years 4 months ago
Process variation tolerant low power DCT architecture
: 2-D Discrete Cosine Transform (DCT) is widely used as the core of digital image and video compression. In this paper, we present a novel DCT architecture that allows aggressive v...
Nilanjan Banerjee, Georgios Karakonstantis, Kaushi...
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 4 months ago
An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks
— Mobile users are expected to be highly dynamic in next generation mobile networks. Additionally they will be served a wide variety of services with different transmission rates...
Tarik Taleb, Yuji Ikeda, Kazuo Hashimoto, Yoshiaki...
MSS
2007
IEEE
105views Hardware» more  MSS 2007»
15 years 4 months ago
Quota enforcement for high-performance distributed storage systems
Storage systems manage quotas to ensure that no one user can use more than their share of storage, and that each user gets the storage they need. This is difficult for large, dis...
Kristal T. Pollack, Darrell D. E. Long, Richard A....
SMC
2007
IEEE
150views Control Systems» more  SMC 2007»
15 years 4 months ago
An intelligent knowledge sharing system for web communities
— This paper presents the prototype of an expert peering system for information exchange in the knowledge society. Our system realizes an intelligent, real-time search engine for...
Christian Bauckhage, Tansu Alpcan, Sachin Agarwal,...
ATAL
2007
Springer
15 years 4 months ago
Commitment-driven distributed joint policy search
Decentralized MDPs provide powerful models of interactions in multi-agent environments, but are often very difficult or even computationally infeasible to solve optimally. Here we...
Stefan J. Witwicki, Edmund H. Durfee
« Prev « First page 1156 / 1190 Last » Next »