Sciweavers

653 search results - page 94 / 131
» Factored Planning: How, When, and When Not
Sort
View
SOUPS
2009
ACM
15 years 8 months ago
Games for extracting randomness
Randomness is a necessary ingredient in various computational tasks and especially in Cryptography, yet many existing mechanisms for obtaining randomness suffer from numerous pro...
Ran Halprin, Moni Naor
INFOCOM
2008
IEEE
15 years 8 months ago
Capacity of Asynchronous Random-Access Scheduling in Wireless Networks
Abstract—We study the throughput capacity of wireless networks which employ (asynchronous) random-access scheduling as opposed to deterministic scheduling. The central question w...
Deepti Chafekar, Dave Levin, V. S. Anil Kumar, Mad...
AINA
2007
IEEE
15 years 8 months ago
Depth-Latency Tradeoffs in Multicast Tree Algorithms
The construction of multicast trees is complicated by the need to balance a number of important objectives, including: minimizing latencies, minimizing depth/hops, and bounding th...
Michael T. Helmick, Fred S. Annexstein
ICON
2007
IEEE
15 years 8 months ago
The Capacity of MIMO-based Wireless Mesh Networks
—Data transmission in wireless mesh networks (WMNs) has a multi-hop nature where data is originated/destinated to one source/sink node. Therefore, the transmission capacity at th...
Wael Jaafar, Wessam Ajib, Sami Tabbane
ATAL
2007
Springer
15 years 8 months ago
Dynamic movement and positioning of embodied agents in multiparty conversations
For embodied agents to engage in realistic multiparty conversation, they must stand in appropriate places with respect to other agents and the environment. When these factors chan...
Dusan Jan, David R. Traum