Sciweavers

20126 search results - page 3995 / 4026
» Timed Transition Systems
Sort
View
106
Voted
ALIFE
2000
15 years 11 days ago
Talking Helps: Evolving Communicating Agents for the Predator-Prey Pursuit Problem
We analyze a general model of multi-agent communication in which all agents communicate simultaneously to a message board. A genetic algorithm is used to evolve multi-agent languag...
Kam-Chuen Jim, C. Lee Giles
108
Voted
CGF
2002
149views more  CGF 2002»
15 years 10 days ago
Using Perceptual Texture Masking for Efficient Image Synthesis
Texture mapping has become indispensable in image synthesis as an inexpensive source of rich visual detail. Less obvious, but just as useful, is its ability to mask image errors d...
Bruce Walter, Sumanta N. Pattanaik, Donald P. Gree...
CLUSTER
2002
IEEE
15 years 10 days ago
WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks
In this paper, we propose an on-demand distributed clustering algorithm for multi-hop packet radio networks. These types of networks, also known as ad hoc networks, are dynamic in ...
Mainak Chatterjee, Sajal K. Das, Damla Turgut
106
Voted
DT
2000
88views more  DT 2000»
15 years 10 days ago
Postsilicon Validation Methodology for Microprocessors
f abstraction as applicable to break the problem's complexity, and innovating better techniques to address complexity of new microarchitectural features. Validation techniques...
Hemant G. Rotithor
JOC
2000
181views more  JOC 2000»
15 years 9 days ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
« Prev « First page 3995 / 4026 Last » Next »