Sciweavers

399 search results - page 68 / 80
» Games with Congestion-Averse Utilities
Sort
View
WIOPT
2006
IEEE
15 years 5 months ago
Reverse engineering MAC
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Ao Tang, Jang-Won Lee, Jianwei Huang, Mung Chiang,...
UIST
2006
ACM
15 years 5 months ago
Using a low-cost electroencephalograph for task classification in HCI research
Modern brain sensing technologies provide a variety of methods for detecting specific forms of brain activity. In this paper, we present an initial step in exploring how these tec...
Johnny Chung Lee, Desney S. Tan
ICRA
2009
IEEE
126views Robotics» more  ICRA 2009»
15 years 6 months ago
Finding the optimal strategies for robotic patrolling with adversaries in topologically-represented environments
Abstract— Using autonomous mobile robots to patrol environments for detecting intruders is a topic of increasing relevance for its possible applications. A large part of strategi...
Francesco Amigoni, Nicola Basilico, Nicola Gatti
ICPR
2008
IEEE
15 years 6 months ago
Robust trajectory estimation of soccer players by using two cameras
This paper proposes a method to estimate the trajectories of soccer players by using two cameras set in a large-scale outdoor space such as a soccer stadium, which is normally not...
Nozomu Kasuya, Itaru Kitahara, Yoshinari Kameda, Y...
79
Voted
CEC
2007
IEEE
15 years 6 months ago
Evolving cooperation in the non-iterated prisoner's dilemma: A social network inspired approach
— Online service provision is becoming increasingly decentralized as system designers pursue the benefits gained from utilizing nodes at the periphery of the network. However, d...
T. S. Ellis, X. Yao