Sciweavers

5948 search results - page 222 / 1190
» Computing Robust Counter-Strategies
Sort
View
119
Voted
P2P
2009
IEEE
103views Communications» more  P2P 2009»
15 years 10 months ago
Towards Robust Peer Counting
Abstract—This paper describes T-SIZE, a peer counting protocol that is based on gossip-based aggregation. Peer counting has become increasingly important as the size of the netwo...
Alberto Montresor, Ali Ghodsi
CDC
2008
IEEE
117views Control Systems» more  CDC 2008»
15 years 10 months ago
Motion planning for nonlinear systems using hybridizations and robust controllers on simplices
— In this paper, we consider a motion planning problem for a class of constrained nonlinear systems. In each simplex of a triangulation of the set of states, the nonlinear dynami...
Antoine Girard, Samuel Martin
127
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Robust pose estimation based on Sylvester's equation: Single and multiple collaborative cameras
A method is introduced to track the object’s motion and estimate its pose from multiple cameras. Firstly pose estimation from one camera is explained. We show that pose estimati...
Chong Chen, Dan Schonfeld, Magdi A. Mohamed
WCNC
2008
IEEE
15 years 10 months ago
Clusterization for Robust Geographic Routing in Wireless Sensor Networks
— A cross-layer algorithm for geographic routing in Wireless Sensor Networks (WSNs) is proposed, which is robust to dead-ends and resilient to topological variations due to netwo...
Carlos Lima, Giuseppe Thadeu Freitas de Abreu
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 10 months ago
On Bit Error Robustness of Trellis Source Codes
— Trellis codes based on linear congruential recursions have recently been introduced as powerful source codes. For a modest computational complexity they offer excellent rate di...
Tomas Eriksson, Norbert Goertz