Sciweavers

1809 search results - page 100 / 362
» Weakly Computable Real Numbers
Sort
View
ICCSA
2010
Springer
15 years 11 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
STOC
2010
ACM
176views Algorithms» more  STOC 2010»
15 years 9 months ago
Complexity Theory for Operators in Analysis
We propose a new framework for discussing computational complexity of problems involving uncountably many objects, such as real numbers, sets and functions, that can be represente...
Akitoshi Kawamura and Stephen Cook
AINA
2006
IEEE
15 years 10 months ago
Equation Based Congestion Control for Video Transmission over WCDMA Networks
The scheme of real time streaming video is one of the newcomers in wireless data communication, raising a number of new requirements in both telecommunication and data communicati...
Antonios G. Alexiou, Dimitrios Antonellis, Christo...
ICCV
2005
IEEE
15 years 9 months ago
How Hard is 3-View Triangulation Really?
We present a solution for optimal triangulation in three views. The solution is guaranteed to find the optimal solution because it computes all the stationary points of the (maxi...
Henrik Stewénius, Frederik Schaffalitzky, D...
FLAIRS
2004
15 years 5 months ago
Developing Task Specific Sensing Strategies Using Reinforcement Learning
Robots that can adapt and perform multiple tasks promise to be a powerful tool with many applications. In order to achieve such robots, control systems have to be constructed that...
Srividhya Rajendran, Manfred Huber