Sciweavers

1989 search results - page 362 / 398
» Applications of a model based predictive control to heat-exc...
Sort
View
DALT
2004
Springer
14 years 1 months ago
A Protocol for Resource Sharing in Norm-Governed Ad Hoc Networks
Ad hoc networks may be viewed as computational systems whose members may fail to, or choose not to, comply with the rules governing their behaviour. We are investigating to what ex...
Alexander Artikis, Lloyd Kamara, Jeremy Pitt, Mare...
ANTSW
2008
Springer
13 years 9 months ago
A Simulation Study of Routing Performance in Realistic Urban Scenarios for MANETs
Abstract. We study through simulation the performance of two MANET routing algorithms in a realistic urban environment. The two algorithms, AODV and AntHocNet, are representative o...
Gianni Di Caro, Frederick Ducatelle, Luca Maria Ga...
FTCS
1998
114views more  FTCS 1998»
13 years 9 months ago
Verification of a Safety-Critical Railway Interlocking System with Real-Time Constraints
Ensuring the correctness of computer systems used in lifecritical applications is very difficult. The most commonly used verification methods, simulation and testing, are not exha...
Vicky Hartonas-Garmhausen, Sérgio Vale Agui...
CORR
2011
Springer
170views Education» more  CORR 2011»
13 years 2 months ago
Ecosystem Viable Yields
The World Summit on Sustainable Development (Johannesburg, 2002) encouraged the application of the ecosystem approach by 2010. However, at the same Summit, the signatory States un...
Michel De Lara, Eladio Ocaña Anaya, Ricardo...
ICDM
2002
IEEE
105views Data Mining» more  ICDM 2002»
14 years 20 days ago
Empirical Comparison of Various Reinforcement Learning Strategies for Sequential Targeted Marketing
We empirically evaluate the performance of various reinforcement learning methods in applications to sequential targeted marketing. In particular, we propose and evaluate a progre...
Naoki Abe, Edwin P. D. Pednault, Haixun Wang, Bian...