Sciweavers

1805 search results - page 351 / 361
» A Theory of Closure Operators
Sort
View
CORR
2007
Springer
134views Education» more  CORR 2007»
15 years 3 months ago
Rate-Constrained Wireless Networks with Fading Channels: Interference-Limited and Noise-Limited Regimes
A network of n wireless communication links is considered in a Rayleigh fading environment. It is assumed that each link can be active and transmit with a constant power P or rema...
Masoud Ebrahimi, Amir K. Khandani
JAR
2006
236views more  JAR 2006»
15 years 3 months ago
Deciding Boolean Algebra with Presburger Arithmetic
We describe an algorithm for deciding the first-order multisorted theory BAPA, which combines 1) Boolean algebras of sets of uninterpreted elements (BA) and 2) Presburger arithmeti...
Viktor Kuncak, Huu Hai Nguyen, Martin C. Rinard
159
Voted
JMM2
2006
167views more  JMM2 2006»
15 years 3 months ago
Computer Vision Methods for Improved Mobile Robot State Estimation in Challenging Terrains
External perception based on vision plays a critical role in developing improved and robust localization algorithms, as well as gaining important information about the vehicle and ...
Annalisa Milella, Giulio Reina, Roland Siegwart
MST
2006
136views more  MST 2006»
15 years 3 months ago
Simple Efficient Load-Balancing Algorithms for Peer-to-Peer Systems
Load balancing is a critical issue for the efficient operation of peerto-peer networks. We give two new load-balancing protocols whose provable performance guarantees are within a...
David R. Karger, Matthias Ruhl
134
Voted
SIGCSE
2008
ACM
166views Education» more  SIGCSE 2008»
15 years 3 months ago
Defense against the dark arts
Computer science faculty must attract and retain students by offering innovative courses that spark student interest, yet still teach core, computer science concepts. These effort...
Mark W. Bailey, Clark L. Coleman, Jack W. Davidson