Sciweavers

10674 search results - page 1997 / 2135
» The Virtual Environment - Another Approach
Sort
View
EJWCN
2011
77views more  EJWCN 2011»
14 years 11 months ago
Emulating Opportunistic Networks with KauNet Triggers
In opportunistic networks the availability of an end-to-end path is no longer required. Instead opportunistic networks may take advantage of temporary connectivity opportunities. ...
Tanguy Pérennou, Anna Brunstrom, Tomas Hall...
TMC
2011
137views more  TMC 2011»
14 years 11 months ago
Cognitive Medium Access: Exploration, Exploitation, and Competition
— This paper establishes the equivalence between cognitive medium access and the competitive multi-armed bandit problem. First, the scenario in which a single cognitive user wish...
Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent...
TSP
2011
197views more  TSP 2011»
14 years 11 months ago
Group Object Structure and State Estimation With Evolving Networks and Monte Carlo Methods
—This paper proposes a technique for motion estimation of groups of targets based on evolving graph networks. The main novelty over alternative group tracking techniques stems fr...
Amadou Gning, Lyudmila Mihaylova, Simon Maskell, S...
APSCC
2010
IEEE
14 years 11 months ago
ValySeC: A Variability Analysis Tool for Service Compositions Using VxBPEL
Nowadays applications are increasingly developed based on remote Web services and service composition has become a powerful novel development paradigm. Due to the fact that such a...
Chang-ai Sun, Tieheng Xue, Marco Aiello
EJWCN
2010
122views more  EJWCN 2010»
14 years 11 months ago
Using Model Checking for Analyzing Distributed Power Control Problems
Model checking (MC) is a formal verification technique which has known and still knows a resounding success in the computer science community. Realizing that the distributed power...
Thomas Brihaye, Marc Jungers, Samson Lasaulce, Nic...
« Prev « First page 1997 / 2135 Last » Next »