We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
This paper presents a method for accurately segmenting and classifying 3D range data into particular object classes. Object classification of input images is necessary for applicat...
Simulation of landscape ecosystems with high realism demands computing power greatly exceeding that of current workstation technology. However, the prospects are excellent that mo...
Bernard P. Zeigler, Yoonkeon Moon, Doohwan Kim, Je...
We will demonstrate distributed conflict resolution in the context of personalized meeting scheduling. The demonstration will show how distributed constraint optimization can be u...
Pauline M. Berry, Cory Albright, Emma Bowring, Ken...
Abstract— A distributed medium access control (MAC) algorithm for uplink OFDMA networks under the IEEE 802.16 framework is proposed and analyzed in this work. We present a simple...