Sciweavers

1083 search results - page 140 / 217
» The limits of localization using RSS
Sort
View
142
Voted
INFOCOM
2007
IEEE
15 years 11 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras
139
Voted
ROBOCOMM
2007
IEEE
15 years 10 months ago
Shared memories: a trail-based coordination server for robot teams
Abstract—Robust, dependable and concise coordination between members of a robot team is a critical ingredient of any such collective activity. Depending on the availability and t...
George Roussos, Dikaios Papadogkonas, J. Taylor, D...
WDAG
2007
Springer
63views Algorithms» more  WDAG 2007»
15 years 10 months ago
A Formal Analysis of the Deferred Update Technique
The deferred update technique is a widely used approach for building replicated database systems. Its fame stems from the fact that read-only transactions can execute locally to a...
Rodrigo Schmidt, Fernando Pedone
ICRA
2005
IEEE
121views Robotics» more  ICRA 2005»
15 years 10 months ago
Modeling and Analysis of Beaconless and Beacon-Based Policies for a Swarm-Intelligent Inspection System
Abstract— We are developing a swarm-intelligent inspection system based on a swarm of autonomous, miniature robots, using only on-board, local sensors. To estimate intrinsic adva...
Nikolaus Correll, Alcherio Martinoli
GECCO
2005
Springer
127views Optimization» more  GECCO 2005»
15 years 10 months ago
The enhanced evolutionary tabu search and its application to the quadratic assignment problem
We describe the Enhanced Evolutionary Tabu Search (EE-TS) local search technique. The EE-TS metaheuristic technique combines Reactive Tabu Search with evolutionary computing eleme...
John F. McLoughlin III, Walter Cedeño