Sciweavers

1176 search results - page 120 / 236
» Exploiting Online Games
Sort
View
ICC
2009
IEEE
201views Communications» more  ICC 2009»
14 years 8 months ago
Analyzing Selfish Topology Control in Multi-Radio Multi-Channel Multi-Hop Wireless Networks
Typically, topology control is perceived as a per-node transmit power control process that achieves certain networklevel objectives. We take an alternative approach of controlling ...
Ramakant S. Komali, Allen B. MacKenzie
EJWCN
2010
122views more  EJWCN 2010»
14 years 5 months ago
Using Model Checking for Analyzing Distributed Power Control Problems
Model checking (MC) is a formal verification technique which has known and still knows a resounding success in the computer science community. Realizing that the distributed power...
Thomas Brihaye, Marc Jungers, Samson Lasaulce, Nic...
EACL
2006
ACL Anthology
15 years 12 days ago
Using Encyclopedic Knowledge for Named entity Disambiguation
We present a new method for detecting and disambiguating named entities in open domain text. A disambiguation SVM kernel is trained to exploit the high coverage and rich structure...
Razvan C. Bunescu, Marius Pasca
ETS
2006
IEEE
122views Hardware» more  ETS 2006»
15 years 2 months ago
Fault Identification in Reconfigurable Carry Lookahead Adders Targeting Nanoelectronic Fabrics
Online repair through reconfiguration is a particularly advantageous approach in the nanoelectronic environment since reconfigurability is naturally supported by the devices. Howe...
Wenjing Rao, Alex Orailoglu, Ramesh Karri
CONCUR
2009
Springer
15 years 5 months ago
Compositional Control Synthesis for Partially Observable Systems
We present a compositional method for deriving control constraints on a network of interconnected, partially observable and partially controllable plant components. The constraint ...
Wouter Kuijper, Jaco van de Pol