Sciweavers

9325 search results - page 1536 / 1865
» The decentralized implementability problem
Sort
View
ICRA
2010
IEEE
119views Robotics» more  ICRA 2010»
15 years 3 months ago
Evader surveillance under incomplete information
— This paper is concerned with determining whether a mobile robot, called the pursuer, is up to maintaining visibility of an antagonist agent, called the evader. This problem, a ...
Israel Becerra, Rafael Murrieta-Cid, Raul Monroy
IEE
2010
136views more  IEE 2010»
15 years 3 months ago
Assume-guarantee verification of software components in SOFA 2 framework
A key problem in compositional model checking of software systems is that typical model checkers accept only closed systems (runnable programs) and therefore a component cannot be ...
Pavel Parizek, Frantisek Plasil
IEEEHPCS
2010
15 years 3 months ago
An experimental study of greedy routing algorithms
The “small world” phenomenon, i.e., the fact that the global social network is strongly connected in the sense that every two persons are inter-related through a small chain o...
Stavros Athanassopoulos, Christos Kaklamanis, Ilia...
IJITM
2010
93views more  IJITM 2010»
15 years 3 months ago
A group evidential reasoning approach for enterprise architecture framework selection
: Enterprise architecture (EA) frameworks are used to ensure interoperability of information systems and improve the effectiveness and efficiency of business organisations. Several...
Faramak Zandi, Madjid Tavana
INFOCOM
2010
IEEE
15 years 3 months ago
Beyond Triangle Inequality: Sifting Noisy and Outlier Distance Measurements for Localization
—Knowing accurate positions of nodes in wireless ad-hoc and sensor networks is essential for a wide range of pervasive and mobile applications. However, errors are inevitable in ...
Lirong Jian, Zheng Yang, Yunhao Liu
« Prev « First page 1536 / 1865 Last » Next »