Sciweavers

854 search results - page 100 / 171
» Using Simulation to Investigate Requirements Prioritization ...
Sort
View
86
Voted
UAI
2008
15 years 2 months ago
Learning and Solving Many-Player Games through a Cluster-Based Representation
In addressing the challenge of exponential scaling with the number of agents we adopt a cluster-based representation to approximately solve asymmetric games of very many players. ...
Sevan G. Ficici, David C. Parkes, Avi Pfeffer
87
Voted
TIP
2002
123views more  TIP 2002»
15 years 11 days ago
A doubly adaptive approach to dynamic MRI sequence estimation
Dynamic magnetic resonance imaging (MRI) refers to the acquisition of a sequence of MRI images to monitor temporal changes in tissue structure. In this paper we present a method fo...
William Scott Hoge, Eric L. Miller, Hanoch Lev-Ari...
116
Voted
TMC
2010
111views more  TMC 2010»
14 years 11 months ago
Interference Management and Rate Adaptation in OFDM-Based UWB Networks
—Ultra-wideband (UWB) communications has emerged as a promising technology for high data rate wireless personal area networks (WPANs). Several proposals for UWB-based WPANs have ...
Raed T. Al-Zubi, Marwan Krunz
SAC
2011
ACM
14 years 3 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
123
Voted
SDMW
2004
Springer
15 years 6 months ago
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
Abstract. Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one com...
Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslet...