Sciweavers

2861 search results - page 485 / 573
» Constraint Programming
Sort
View
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
15 years 5 months ago
Security when people matter: structuring incentives for user behavior
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives p...
Rick Wash, Jeffrey K. MacKie-Mason
TWC
2008
98views more  TWC 2008»
15 years 1 months ago
Resource Allocation for Delay Differentiated Traffic in Multiuser OFDM Systems
Abstract-- Most existing work on adaptive allocation of subcarriers and power in multiuser OFDM systems has focused on homogeneous traffic consisting of delay-constrained data (gua...
Meixia Tao, Ying-Chang Liang, Fan Zhang
GLOBECOM
2010
IEEE
14 years 11 months ago
Prolonging Network Lifetime via a Controlled Mobile Sink in Wireless Sensor Networks
In this paper we explore the mobility of a mobile sink in a wireless sensor network (WSN) to prolong the network lifetime. Since the mechanical movement of mobile sink is driven by...
Weifa Liang, Jun Luo, Xu Xu
134
Voted
ATAL
2007
Springer
15 years 8 months ago
Commitment-driven distributed joint policy search
Decentralized MDPs provide powerful models of interactions in multi-agent environments, but are often very difficult or even computationally infeasible to solve optimally. Here we...
Stefan J. Witwicki, Edmund H. Durfee
AUIC
2006
IEEE
15 years 7 months ago
Implementing a natural user interface for camera phones using visual tags
Pointing is a natural way of communicating. Children in all cultures use pointing inherently. Attaching tags to our environment enables interaction by pointing. Visual tags are a g...
Sanni Siltanen, Jouko Hyväkkä