Sciweavers

5275 search results - page 314 / 1055
» Computing by observing
Sort
View
122
Voted
P2P
2009
IEEE
167views Communications» more  P2P 2009»
15 years 11 months ago
ID Repetition in Kad
ID uniqueness is essential in DHT-based systems as peer lookup and resource searching rely on IDmatching. Many previous works and measurements on Kad do not take into account that...
Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang, Zh...
RTCSA
2009
IEEE
15 years 11 months ago
Multi-path Planning for Mobile Element to Prolong the Lifetime of Wireless Sensor Networks
Mobile elements, which can traverse the deployment area and convey the observed data from static sensor nodes to a base station, have been introduced for energy efficient data co...
Dakai Zhu, Yifeng Guo, Ali Saman Tosun
145
Voted
ICRA
2009
IEEE
123views Robotics» more  ICRA 2009»
15 years 11 months ago
Tracking groups of people with a multi-model hypothesis tracker
Abstract— People in densely populated environments typically form groups that split and merge. In this paper we track groups of people so as to reflect this formation process an...
Boris Lau, Kai Oliver Arras, Wolfram Burgard
ICRA
2009
IEEE
122views Robotics» more  ICRA 2009»
15 years 11 months ago
Cooperative multi-robot localization under communication constraints
— This paper addresses the problem of cooperative localization (CL) under severe communication constraints. Specifically, we present minimum mean square error (MMSE) and maximum...
Nikolas Trawny, Stergios I. Roumeliotis, Georgios ...
ACML
2009
Springer
15 years 11 months ago
Injecting Structured Data to Generative Topic Model in Enterprise Settings
Enterprises have accumulated both structured and unstructured data steadily as computing resources improve. However, previous research on enterprise data mining often treats these ...
Han Xiao, Xiaojie Wang, Chao Du