Sciweavers

1722 search results - page 256 / 345
» Dedication
Sort
View
169
Voted
WD
2010
14 years 10 months ago
CAODV: Routing in mobile ad-hoc cognitive radio networks
This paper deals with the routing in cognitive mobile ad hoc networks. We propose to modify the widely adopted Ad-hoc On-demand Distance Vector (AODV) protocol [1] in order to assu...
Angela Sara Cacciapuoti, Cosimo Calcagno, Marcello...
APSEC
2009
IEEE
14 years 10 months ago
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification
Abstract--Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
97
Voted
FAST
2009
14 years 10 months ago
BORG: Block-reORGanization for Self-optimizing Storage Systems
This paper presents the design, implementation, and evaluation of BORG, a self-optimizing storage system that performs automatic block reorganization based on the observed I/O wor...
Medha Bhadkamkar, Jorge Guerra, Luis Useche, Sam B...
GECCO
2009
Springer
113views Optimization» more  GECCO 2009»
14 years 10 months ago
Single step evolution of robot controllers for sequential tasks
The generation of robot controllers for a task requiring a sequence of elementary behaviors is still a challenge. If these behaviors are known, intermediate steps can be given to ...
Stéphane Doncieux, Jean-Baptiste Mouret
100
Voted
GVD
2009
162views Database» more  GVD 2009»
14 years 10 months ago
Archiving and Maintaining Curated Databases
Curated databases represent a substantial amount of effort by a dedicated group of people to produce a definitive description of some subject area. The value of curated databases ...
Heiko Müller