Sciweavers

2242 search results - page 351 / 449
» Using Simulation in Call Centers
Sort
View
JNW
2006
120views more  JNW 2006»
15 years 3 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
GPEM
2007
71views more  GPEM 2007»
15 years 3 months ago
Integrating generative growth and evolutionary computation for form exploration
We present a novel means of algorithmically describing a growth process that is an extension of Lindenmayer’s Map L-systems. This growth process relies upon a set of rewrite rule...
Una-May O'Reilly, Martin Hemberg
IAJIT
2007
150views more  IAJIT 2007»
15 years 3 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
SWARM
2008
SPRINGER
115views Optimization» more  SWARM 2008»
15 years 2 months ago
Path formation in a robot swarm
We present two swarm intelligence control mechanisms used for distributed robot path formation. In the first, the robots form linear chains. We study three variants of robot chains...
Shervin Nouyan, Alexandre Campo, Marco Dorigo
JALC
2007
79views more  JALC 2007»
15 years 2 months ago
Two-Way Finite Automata with a Write-Once Track
The basic finite automata model has been extended over the years with different acceptance modes (nondeterminism, alternation), new or improved devices (two-way heads, pebbles, ...
Berke Durak