Sciweavers

5344 search results - page 340 / 1069
» Privacy-Preserving Set Operations
Sort
View
IROS
2006
IEEE
113views Robotics» more  IROS 2006»
15 years 10 months ago
A Framework for Automatic Deployment of Robots in 2D and 3D Environments
Abstract— We present a computational framework for automatic deployment of robots in 2D and 3D rectangular environments with polytopal obstacles. The results are derived for poly...
Marius Kloetzer, Calin Belta
IWCMC
2006
ACM
15 years 10 months ago
A simulation study of a MAC layer protocol for wireless networks with asymmetric links
— Asymmetric links are common in wireless networks for a variety of physical, logical, operational, and legal considerations. An asymmetric link supports uni-directional communic...
Guoqiang Wang, Damla Turgut, Ladislau Böl&oum...
INFOCOM
2005
IEEE
15 years 10 months ago
Relating two formal models of path-vector routing
— This paper unifies two independently developed formalisms for path-vector routing protocols such as the Border Gateway Protocol (BGP), the standard inter-domain routing protoc...
Aaron D. Jaggard, Vijay Ramachandran
ISIPTA
2005
IEEE
143views Mathematics» more  ISIPTA 2005»
15 years 10 months ago
A Granular Semantics for Fuzzy Measures and its Application to Climate Change Scenarios
A granular based semantics for fuzzy measures is introduced in which the measure of a set of propositions approximates the probability of the disjunction of these propositions. Th...
Jonathan Lawry, Jim Hall, Guangtao Fu
CALCO
2005
Springer
98views Mathematics» more  CALCO 2005»
15 years 10 months ago
The Least Fibred Lifting and the Expressivity of Coalgebraic Modal Logic
Every endofunctor B on the category Set can be lifted to a fibred functor on the category (fibred over Set) of equivalence relations and relation-preserving functions. In this pa...
Bartek Klin