Sciweavers

1263 search results - page 205 / 253
» A* with Bounded Costs
Sort
View
COMCOM
2006
100views more  COMCOM 2006»
13 years 8 months ago
Routing and wavelength assignment for core-based tree in WDM networks
In this paper, we address the routing and wavelength assignment problem for the core-based tree (CBT) service in a wavelength-division-multiplexing (WDM) network, where k sources ...
Jianping Wang, Xiangtong Qi, Mei Yang
ESWA
2006
123views more  ESWA 2006»
13 years 8 months ago
Design of a RFID case-based resource management system for warehouse operations
In the past, the selection of resources to execute various warehouse operation services was done solely by experts. In this paper, a RFIDbased Resource Management System (RFID-RMS...
Harry K. H. Chow, King Lun Choy, W. B. Lee, K. C. ...
IJFCS
2008
158views more  IJFCS 2008»
13 years 8 months ago
An Alternative Construction in Symbolic Reachability Analysis of Second Order Pushdown Systems
Abstract. Recently, it has been shown that for any higher order pushdown system H and for any regular set C of configurations, the set pre H(C), is regular. In this paper, we give ...
Anil Seth
IJVR
2006
119views more  IJVR 2006»
13 years 8 months ago
Viewpoint Usability for Desktop Augmented Reality
In this paper, we have investigated the comparative usability among three different viewing configurations of augmented reality (AR) system that uses a desktop monitor instead of a...
Seokhee Jeon, HyeongSeop Shim, Gerard Jounghyun Ki...
JSAC
2008
95views more  JSAC 2008»
13 years 8 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras