Sciweavers

6907 search results - page 1254 / 1382
» Securing distributed adaptation
Sort
View
AAMAS
2007
Springer
14 years 10 months ago
Local strategy learning in networked multi-agent team formation
Abstract. Networked multi-agent systems are comprised of many autonomous yet interdependent agents situated in a virtual social network. Two examples of such systems are supply cha...
Blazej Bulka, Matthew E. Gaston, Marie desJardins
CORR
2010
Springer
186views Education» more  CORR 2010»
14 years 10 months ago
Channel Estimation for Opportunistic Spectrum Access: Uniform and Random Sensing
The knowledge of channel statistics can be very helpful in making sound opportunistic spectrum access decisions. It is therefore desirable to be able to efficiently and accurately...
Quanquan Liang, Mingyan Liu
CORR
2008
Springer
99views Education» more  CORR 2008»
14 years 10 months ago
A Model-Based Frequency Constraint for Mining Associations from Transaction Data
Mining frequent itemsets is a popular method for finding associated items in databases. For this method, support, the co-occurrence frequency of the items which form an associatio...
Michael Hahsler
CORR
2008
Springer
119views Education» more  CORR 2008»
14 years 10 months ago
BER and Outage Probability Approximations for LMMSE Detectors on Correlated MIMO Channels
This paper is devoted to the study of the performance of the linear minimum mean-square error (LMMSE) receiver for (receive) correlated multiple-input multiple-output (MIMO) system...
Abla Kammoun, Malika Kharouf, Walid Hachem, Jamal ...
CORR
2006
Springer
104views Education» more  CORR 2006»
14 years 10 months ago
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarc...
Bryan Ford
« Prev « First page 1254 / 1382 Last » Next »