Sciweavers

3883 search results - page 686 / 777
» Design mentoring based on design evolution analysis
Sort
View
TWC
2008
156views more  TWC 2008»
15 years 4 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
CONSTRAINTS
2004
116views more  CONSTRAINTS 2004»
15 years 4 months ago
Decision Tradeoff Using Example-Critiquing and Constraint Programming
We consider constructive preference elicitation for decision aid systems in applications such as configuration or electronic catalogs. We are particularly interested in supporting ...
Pearl Pu, Boi Faltings
CN
2002
77views more  CN 2002»
15 years 4 months ago
MATE: multipath adaptive traffic engineering
Destination-based forwarding in traditional IP routers has not been able to take full advantage of multiple paths that frequently exist in Internet Service Provider Networks. As a...
Anwar Elwalid, Cheng Jin, Steven H. Low, Indra Wid...
ETS
2002
IEEE
146views Hardware» more  ETS 2002»
15 years 4 months ago
Teaching Motor Disability Assessment over the Web: MODASPECTRA
MODASPECTRA (MOtor Disability Assessment SPEcialists' TRAining) was a research and technology development project aimed at developing quality teaching and training of post-gr...
Salvatore Valenti, Sandro Fioretti, Maurizio Mauri...
MP
1998
109views more  MP 1998»
15 years 4 months ago
Rounding algorithms for covering problems
In the last 25 years approximation algorithms for discrete optimization problems have been in the center of research in the fields of mathematical programming and computer science...
Dimitris Bertsimas, Rakesh V. Vohra