Sciweavers

2572 search results - page 417 / 515
» codes 2008
Sort
View
101
Voted
CORR
2008
Springer
108views Education» more  CORR 2008»
15 years 25 days ago
Restricted Mobility Improves Delay-Throughput Trade-offs in Mobile Ad-Hoc Networks
Abstract-- In this paper, we analyze asymptotic delaythroughput trade-offs in mobile ad-hoc networks comprising heterogeneous nodes with restricted mobility. We show that node spat...
Michele Garetto, Emilio Leonardi
86
Voted
SWARM
2008
SPRINGER
15 years 20 days ago
Massively multi-robot simulation in stage
Abstract Stage is a C++ software library that simulates multiple mobile robots. Stage version 2, as the simulation backend for the Player/Stage system, may be the most commonly use...
Richard Vaughan
164
Voted
NPC
2010
Springer
14 years 11 months ago
Vectorization for Java
Java is one of the most popular programming languages in today’s software development, but the adoption of Java in some areas like high performance computing, gaming, and media p...
Jiutao Nie, Buqi Cheng, Shisheng Li, Ligang Wang, ...
103
Voted
GECCO
2008
Springer
148views Optimization» more  GECCO 2008»
15 years 1 months ago
Using quotient graphs to model neutrality in evolutionary search
We introduce quotient graphs for modeling neutrality in evolutionary search. We demonstrate that for a variety of evolutionary computing problems, search can be characterized by g...
Dominic Wilson, Devinder Kaur
CARDIS
2008
Springer
105views Hardware» more  CARDIS 2008»
15 years 2 months ago
Fast Hash-Based Signatures on Constrained Devices
Digital signatures are one of the most important applications of microprocessor smart cards. The most widely used algorithms for digital signatures, RSA and ECDSA, depend on finite...
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, J...