Sciweavers

3686 search results - page 694 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
ATAL
2009
Springer
14 years 2 months ago
Adversarial search with procedural knowledge heuristic
We introduce an adversarial planning algorithm based on game tree search, which is applicable in large-scale multiplayer domains. In order to tackle the scalability issues of game...
Viliam Lisý, Branislav Bosanský, Mic...
MOBIWAC
2009
ACM
14 years 2 months ago
MeshScan: fast and efficient handoff in IEEE802.11 mesh networks
Handoff delay is one of the major problems in Wireless Mesh Network (WMN) that needs to be solved in order to allow time-critical and real-time applications run continuously durin...
Yin Chen, Karol Kowalik, Mark Davis
GLOBECOM
2007
IEEE
14 years 2 months ago
Stability Emphasizing Cross-Layer Optimization of Transmit Power Allocation in Distributed Wireless Networks
Abstract— This paper theoretically analyzes cross-layer optimized design of transmit power allocation in distributed interference-limited wireless networks with asynchronously ac...
Stepán Kucera, Sonia Aïssa, Susumu Yos...
JCDL
2006
ACM
116views Education» more  JCDL 2006»
14 years 1 months ago
Enabling exploration: travelers in the middle east archive
In this paper, we describe the Travelers in the Middle East Archive (TIMEA), a digital archive focused on Western explorations in the Middle East between the 18th and early 20th c...
Lisa M. Spiro, Marie Wise, Geneva L. Henry, Chuck ...
MOBICOM
2006
ACM
14 years 1 months ago
Multipath profile discrimination in TOA-based WLAN ranging with link layer frames
Indoor ranging and location in WLAN is possible through obtaining Round-Trip-Time (RTT) measurements at data link level. This procedure allows using the existing IEEE 802.11 WLAN ...
Marc Ciurana, Francisco Barceló, Sebastiano...