Sciweavers

175 search results - page 31 / 35
» Exploiting Style in Architectural Design Environments
Sort
View
IJVR
2006
124views more  IJVR 2006»
14 years 9 months ago
Improving Virtual Reality Applications in CAD through Semantics
In this article we propose an architecture for the inclusion and exploitation of semantic aspects in a CAD environment. Our schema focuses on the enhancement and improvement of a c...
Carlos Toro, Jorge Posada, Stefan Wundrak, Andr&ea...
MOBIHOC
2008
ACM
15 years 9 months ago
Optimal relay assignment for cooperative communications
Recently, cooperative communications, in the form of keeping each node with a single antenna and having a node exploit a relay node's antenna, is shown to be a promising appr...
Yi Shi, Sushant Sharma, Y. Thomas Hou, Sastry Komp...
INFOCOM
2009
IEEE
15 years 4 months ago
CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast
—We present CPM, a unified approach that exploits server multicast, assisted by peer downloads, to provide efficient video-on-demand (VoD) in a service provider environment. We...
Vijay Gopalakrishnan, Samrat Bhattacharjee, K. K. ...
ICRA
2005
IEEE
124views Robotics» more  ICRA 2005»
15 years 3 months ago
Swarm Coordination for Pursuit Evasion Games using Sensor Networks
— In this work we consider the problem of pursuit evasion games (PEGs) where a group of pursuers is required to detect, chase and capture a group of evaders with the aid of a sen...
Luca Schenato, Songhwai Oh, Shankar Sastry, Prasan...
ISPDC
2003
IEEE
15 years 2 months ago
OCEAN: The Open Computation Exchange and Arbitration Network, A Market Approach to Meta Computing
— Rapid advancements in processor and networking technologies have led to the evolution of cluster and grid computing frameworks. These high-performance computing environments ex...
Pradeep Padala, Cyrus Harrison, Nicholas Pelfort, ...