Sciweavers

20833 search results - page 3838 / 4167
» Hidden process models
Sort
View
JAIR
2006
101views more  JAIR 2006»
15 years 4 months ago
Resource Allocation Among Agents with MDP-Induced Preferences
Allocating scarce resources among agents to maximize global utility is, in general, computationally challenging. We focus on problems where resources enable agents to execute acti...
Dmitri A. Dolgov, Edmund H. Durfee
JALC
2006
87views more  JALC 2006»
15 years 4 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
JNW
2008
97views more  JNW 2008»
15 years 4 months ago
Vehicle Identification using Discrete Spectrums in Wireless Sensor Networks
We studied the possibility of using wireless sensor networks for vehicle identification in a large open field. This is exciting research in that it not only presents a challenge bu...
Seung S. Yang, Yoon G. Kim, Hongsik Choi
JCB
2006
126views more  JCB 2006»
15 years 4 months ago
Combinatorics of Saturated Secondary Structures of RNA
Following Zuker (1986), a saturated secondary structure for a given RNA sequence is a secondary structure such that no base pair can be added without violating the definition of s...
P. Clote
DC
2007
15 years 4 months ago
The overhead of consensus failure recovery
Abstract Many reliable distributed systems are consensusbased and typically operate under two modes: a fast normal mode in failure-free synchronous periods, and a slower recovery m...
Partha Dutta, Rachid Guerraoui, Idit Keidar
« Prev « First page 3838 / 4167 Last » Next »