Sciweavers

393 search results - page 62 / 79
» The LCA Problem Revisited
Sort
View
98
Voted
DSN
2002
IEEE
15 years 6 months ago
A Realistic Look At Failure Detectors
This paper shows that, in an environment where we do not bound the number of faulty processes, the class P of Perfect failure detectors is the weakest (among realistic failure det...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...
CONEXT
2007
ACM
15 years 5 months ago
Scalable real-time gateway assignment in mobile mesh networks
The perception of future wireless mesh network (WMN) deployment and usage is rapidly evolving. WMNs are now being envisaged to provide citywide "last-mile" access for nu...
Edward Bortnikov, Israel Cidon, Idit Keidar
AAAI
2008
15 years 4 months ago
Efficient Optimization of Information-Theoretic Exploration in SLAM
We present a novel method for information-theoretic exploration, leveraging recent work on mapping and localization. We describe exploration as the constrained optimization proble...
Thomas Kollar, Nicholas Roy
102
Voted
FASE
2008
Springer
15 years 3 months ago
What's in a Feature: A Requirements Engineering Perspective
Abstract. The notion of feature is heavily used in Software Engineering, especially for software product lines. However, this notion appears to be confusing, mixing various aspects...
Andreas Classen, Patrick Heymans, Pierre-Yves Scho...
SSWMC
2004
15 years 3 months ago
An informed synchronization scheme for audio data hiding
This paper deals with the problem of synchronization in the particular case of audio data hiding. In this kind of application the goal is to increase the information of an audio d...
Alejandro LoboGuerrero, Patrick Bas, Joel Lienard