Sciweavers

931 search results - page 88 / 187
» Controlled Experimentation with Agents - Models and Implemen...
Sort
View
AAAI
1990
15 years 1 months ago
Exploiting Locality in a TMS
This paper presents a new approach for exploiting Truth Maintenance Systems(TMSs) which makes them simpler to use without necessarily incurring a substantial performance penalty. ...
Johan de Kleer
CCGRID
2008
IEEE
15 years 6 months ago
Advanced RDMA-Based Admission Control for Modern Data-Centers
—Current data-centers employ admission control mechanism to maintain low response time and high throughput under overloaded scenarios. Existing mechanisms use internal (on the ov...
Ping Lai, Sundeep Narravula, Karthikeyan Vaidyanat...
SAINT
2005
IEEE
15 years 5 months ago
A User-Oriented Presence Synthesizing System for Facilitating On-Line Communication
This paper shows a user-oriented presence synthesizing system, where a user can control not only what she publishes to each buddy but what she sees by synthesizing her buddies’ ...
Masato Kawada, Nodoka Mimura, Hiroyuki Morikawa, T...
MM
2004
ACM
84views Multimedia» more  MM 2004»
15 years 5 months ago
Tools used while developing auracle: a voice-controlled networked instrument
Auracle is a networked sound instrument controlled by the voice. Users jam together over the Internet using only a microphone. Throughout the development process, the authors expe...
Kristjan Varnik, Jason Freeman, Chandrasekhar Rama...
CORR
1998
Springer
107views Education» more  CORR 1998»
14 years 11 months ago
TCP Trunking
TCP trunking is a novel way of applying TCP congestion control to bandwidth management of aggregate traffic. This is accomplished by setting up a separate TCP connection to probe ...
H. T. Kung, S. Y. Wang