Sciweavers

4305 search results - page 774 / 861
» Analysing Protocol Implementations
Sort
View
CORR
2010
Springer
130views Education» more  CORR 2010»
15 years 2 months ago
Discrete Partitioning and Coverage Control for Gossiping Robots
We propose distributed algorithms to automatically deploy a group of mobile robots to partition and provide coverage of a non-convex environment. To handle arbitrary nonconvex envi...
Joseph W. Durham, Ruggero Carli, Paolo Frasca, Fra...
CORR
2008
Springer
102views Education» more  CORR 2008»
15 years 2 months ago
Game Theory with Costly Computation
We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resul...
Joseph Y. Halpern, Rafael Pass
BMCBI
2006
101views more  BMCBI 2006»
15 years 2 months ago
Predicting residue contacts using pragmatic correlated mutations method: reducing the false positives
Background: Predicting residues' contacts using primary amino acid sequence alone is an important task that can guide 3D structure modeling and can verify the quality of the ...
Petras J. Kundrotas, Emil Alexov
COMCOM
2006
93views more  COMCOM 2006»
15 years 2 months ago
On scalability properties of the Hi3 control plane
The Host Identity Indirection Infrastructure (Hi3) is a general-purpose networking architecture, derived from the Internet Indirection Infrastructure (i3) and the Host Identity Pr...
Dmitry Korzun, Andrei Gurtov
CORR
2006
Springer
133views Education» more  CORR 2006»
15 years 2 months ago
IP over P2P: Enabling Self-configuring Virtual IP Networks for Grid Computing
Abstract-- Peer-to-peer (P2P) networks have mostly focused on task oriented networking, where networks are constructed for single applications, i.e. file-sharing, DNS caching, etc....
Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin,...