Sciweavers

1874 search results - page 294 / 375
» Network optimization for DHT-based applications
Sort
View
118
Voted
GLOBECOM
2007
IEEE
15 years 7 months ago
A Novel Scheduling Algorithm for Video Traffic in High-Rate WPANs
Abstract-- The emerging high-rate wireless personal area network (WPAN) technology is capable of supporting high-speed and high-quality real-time multimedia applications. In partic...
Shahab Moradi, Amir Hamed Mohsenian Rad, Vincent W...
131
Voted
GECCO
2010
Springer
187views Optimization» more  GECCO 2010»
15 years 6 months ago
Evolving agent behavior in multiobjective domains using fitness-based shaping
Multiobjective evolutionary algorithms have long been applied to engineering problems. Lately they have also been used to evolve behaviors for intelligent agents. In such applicat...
Jacob Schrum, Risto Miikkulainen
155
Voted
GECCO
2007
Springer
217views Optimization» more  GECCO 2007»
15 years 5 months ago
A quantitative analysis of memory requirement and generalization performance for robotic tasks
In autonomous agent systems, memory is an important element to handle agent behaviors appropriately. We present the analysis of memory requirements for robotic tasks including wal...
DaeEun Kim
114
Voted
TIT
2008
106views more  TIT 2008»
15 years 3 months ago
Constrained Sequential Resource Allocation and Guessing Games
In this paper, we consider a constrained sequential resource allocation problem where an individual needs to accomplish a task by repeatedly guessing/investing a sufficient level o...
Nicholas B. Chang, Mingyan Liu
145
Voted
CCS
2008
ACM
15 years 5 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig