Sciweavers

1262 search results - page 233 / 253
» Reinforcement Learning: An Introduction
Sort
View
165
Voted
PERCOM
2005
ACM
16 years 5 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
162
Voted
SASO
2009
IEEE
16 years 2 days ago
Self-organizing Bandwidth Sharing in Priority-Based Medium Access
In this paper, we present an analysis of self-organizing bandwidth sharing in priority-based medium access. For this purpose, the priority-based Access Game is introduced. Analysi...
Stefan Wildermann, Tobias Ziermann, Jürgen Te...
157
Voted
INFOCOM
2009
IEEE
16 years 6 hour ago
An Adaptive Link Layer for Range Diversity in Multi-Radio Mobile Sensor Networks
—An important challenge in mobile sensor networks is to enable energy-efficient communication over a diversity of distances while being robust to wireless effects caused by node...
Jeremy Gummeson, Deepak Ganesan, Mark D. Corner, P...
139
Voted
SASO
2008
IEEE
15 years 11 months ago
Bottom-Up Self-Organization of Unpredictable Demand and Supply under Decentralized Power Management
In the DEZENT1 project we had established a distributed base model for negotiating electric power from widely distributed (renewable) power sources on multiple levels in successio...
Horst F. Wedde, Sebastian Lehnhoff, Christian Reht...
145
Voted
IJCNN
2007
IEEE
15 years 11 months ago
Adaptive Dynamic Modularity in a Connectionist Model of Context-Dependent Idea Generation
Abstract— Cognitive control - the ability to produce appropriate behavior in complex situations - is a fundamental aspect of intelligence. It is increasingly evident that this co...
Simona Doboli, Ali A. Minai, Vincent R. Brown