Sciweavers

7329 search results - page 1326 / 1466
» Network Extractor Protocols
Sort
View
124
Voted
TFS
2008
93views more  TFS 2008»
15 years 3 months ago
Using Fuzzy Logic to Design Separation Function in Flocking Algorithms
Abstract--Flocking algorithms essentially consist of three components: alignment, cohesion, and separation. To track a desired trajectory, the flock center should move along the de...
Dongbing Gu, Huosheng Hu
134
Voted
TROB
2008
164views more  TROB 2008»
15 years 3 months ago
Dynamic Assignment in Distributed Motion Planning With Local Coordination
Distributed motion planning of multiple agents raises fundamental and novel problems in control theory and robotics. In particular, in applications such as coverage by mobile senso...
Michael M. Zavlanos, George J. Pappas
154
Voted
JSAC
2007
102views more  JSAC 2007»
15 years 3 months ago
Partially-coherent distributed space-time codes with differential encoder and decoder
Abstract— Distributed space-time coding is a means of achieving diversity through cooperative communication in a wireless relay network. In this paper, we consider a transmission...
T. Kiran, B. Sundar Rajan
143
Voted
TWC
2008
112views more  TWC 2008»
15 years 3 months ago
Throughput Analysis of TCP-Friendly Rate Control in Mobile Hotspots
By integrating wireless wide area networks (WWANs) and wireless local area networks (WLANs), mobile hotspot technologies enable seamless Internet multimedia services to users on-bo...
Sangheon Pack, Xuemin Shen, Jon W. Mark, Lin Cai
201
Voted
CCR
2004
79views more  CCR 2004»
15 years 3 months ago
Preventing Internet denial-of-service with capabilities
In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) attacks. Instead of being able to send anything to anyone at any time, in our archi...
Thomas E. Anderson, Timothy Roscoe, David Wetheral...
« Prev « First page 1326 / 1466 Last » Next »