Sciweavers

2340 search results - page 46 / 468
» Second quarter 2008
Sort
View
SIGOPS
2010
74views more  SIGOPS 2010»
14 years 10 months ago
Learning from the past for resolving dilemmas of asynchrony
This paper presents two design approaches to avoid many complications introduced at both user and developer levels by the FLP impossibility. The first approach is appropriate in m...
Paul D. Ezhilchelvan, Santosh K. Shrivastava
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
15 years 6 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas
IROS
2008
IEEE
137views Robotics» more  IROS 2008»
15 years 6 months ago
Avoiding negative depth in inverse depth bearing-only SLAM
Abstract— In this paper we consider ways to alleviate negative estimated depth for the inverse depth parameterisation of bearing-only SLAM. This problem, which can arise even if ...
Martin P. Parsley, Simon J. Julier
CG
2008
Springer
15 years 1 months ago
A Parallel Monte-Carlo Tree Search Algorithm
Monte-Carlo tree search is a powerful paradigm for the game of Go. We present a parallel Master-Slave algorithm for Monte-Carlo tree search. We experimented the algorithm on a netw...
Tristan Cazenave, Nicolas Jouandeau
GLOBECOM
2008
IEEE
14 years 12 months ago
Binary Consensus over Fading Channels: A Best Affine Estimation Approach
In this paper we consider a cooperative network that is trying to reach binary consensus over fading channels. We first characterize the impact of fading on network consensus by up...
Mehrzad Malmirchegini, Yongxiang Ruan, Yasamin Mos...