Sciweavers

326 search results - page 15 / 66
» Capabilities for Uniqueness and Borrowing
Sort
View
ICALT
2006
IEEE
14 years 23 days ago
Instruction Through The Ages: Building Pervasive Virtual Instructors for Life Long Learning
A pervasive virtual instructor is an artificially intelligent instructor that may appear transparent to the learner or appear in the form of a threedimensional graphical character...
Jayfus T. Doswell
WIDM
1999
ACM
13 years 11 months ago
An Efficient Plan Execution System for Information Management Agents
Recent work on information integration has yielded novel and efficient solutions for gathering data from the World Wide Web. However, there has been little attention given to the ...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...
CCGRID
2005
IEEE
13 years 8 months ago
The Composite Endpoint Protocol (CEP): scalable endpoints for terabit flows
We introduce the Composite Endpoint Protocol (CEP) which efficiently composes a set of transmission elements to support high speed flows which exceed the capabilities of a single...
Eric Weigle, Andrew A. Chien
FTCS
1993
111views more  FTCS 1993»
13 years 8 months ago
Detection and Discrimination of Injected Network Faults
Although the present work does in fact employ training data, it does so in the interest of calibrating the results Six hundred faults were induced by injection into five live obtai...
Roy A. Maxion, Robert T. Olszewski
VTC
2008
IEEE
102views Communications» more  VTC 2008»
14 years 1 months ago
Channel Prediction Aided Multiuser Transmission in SDMA
— Transmit preprocessing employed at the basestation (BS) has been proposed for simplifying the design of the mobile receiver. Provided that the channel impulse response (CIR) of...
Wei Liu, Lie-Liang Yang, Lajos Hanzo