Sciweavers

544 search results - page 63 / 109
» Can Realistic BitTorrent Experiments Be Performed on Cluster...
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Synchronized CSMA Contention: Model, Implementation and Evaluation
— A class of CSMA protocols used in a broad range of wireless applications uses synchronized contention where nodes periodically contend at intervals of fixed duration. While se...
Jing Shi, Ehsan Aryafar, Theodoros Salonidis, Edwa...
GECCO
2005
Springer
14 years 1 months ago
Optimizing parameters of a mobile ad hoc network protocol with a genetic algorithm
Mobile ad hoc networks are typically designed and evaluated in generic simulation environments. However the real conditions in which these networks are deployed can be quite diff...
David J. Montana, Jason Redi
ACIVS
2006
Springer
13 years 11 months ago
Affine Epipolar Direction from Two Views of a Planar Contour
Most approaches to camera motion estimation from image sequences require matching the projections of at least 4 non-coplanar points in the scene. The case of points lying on a plan...
Maria Alberich-Carramiñana, Guillem Aleny&a...
ICRA
2010
IEEE
158views Robotics» more  ICRA 2010»
13 years 5 months ago
A measurement distribution framework for cooperative navigation using multiple AUVs
Abstract-- In recent years underwater survey and surveillance missions with more than a single Autonomous Underwater Vehicle (AUV) have become more common thanks to more reliable a...
Maurice F. Fallon, Georgios Papadopoulos, John J. ...
ICST
2009
IEEE
13 years 5 months ago
An Evaluation of Model Checkers for Specification Based Test Case Generation
Under certain constraints the test case generation problem can be represented as a model checking problem, thus enabling the use of powerful model checking tools to perform the te...
Gordon Fraser, Angelo Gargantini