Sciweavers

175 search results - page 31 / 35
» Exploiting Style in Architectural Design Environments
Sort
View
IJVR
2006
124views more  IJVR 2006»
14 years 11 months ago
Improving Virtual Reality Applications in CAD through Semantics
In this article we propose an architecture for the inclusion and exploitation of semantic aspects in a CAD environment. Our schema focuses on the enhancement and improvement of a c...
Carlos Toro, Jorge Posada, Stefan Wundrak, Andr&ea...
MOBIHOC
2008
ACM
15 years 11 months ago
Optimal relay assignment for cooperative communications
Recently, cooperative communications, in the form of keeping each node with a single antenna and having a node exploit a relay node's antenna, is shown to be a promising appr...
Yi Shi, Sushant Sharma, Y. Thomas Hou, Sastry Komp...
INFOCOM
2009
IEEE
15 years 6 months ago
CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast
—We present CPM, a unified approach that exploits server multicast, assisted by peer downloads, to provide efficient video-on-demand (VoD) in a service provider environment. We...
Vijay Gopalakrishnan, Samrat Bhattacharjee, K. K. ...
ICRA
2005
IEEE
124views Robotics» more  ICRA 2005»
15 years 5 months ago
Swarm Coordination for Pursuit Evasion Games using Sensor Networks
— In this work we consider the problem of pursuit evasion games (PEGs) where a group of pursuers is required to detect, chase and capture a group of evaders with the aid of a sen...
Luca Schenato, Songhwai Oh, Shankar Sastry, Prasan...
ISPDC
2003
IEEE
15 years 5 months ago
OCEAN: The Open Computation Exchange and Arbitration Network, A Market Approach to Meta Computing
— Rapid advancements in processor and networking technologies have led to the evolution of cluster and grid computing frameworks. These high-performance computing environments ex...
Pradeep Padala, Cyrus Harrison, Nicholas Pelfort, ...