Sciweavers

1626 search results - page 46 / 326
» Computing the Types of the Relationships between Autonomous ...
Sort
View
ISDA
2006
IEEE
14 years 2 months ago
Efficient Multiplier over Finite Field Represented in Type II Optimal Normal Basis
- Elliptic curve cryptography plays a crucial role in networking and information security area, and modular multiplication arithmetic over finite field is a necessary computation p...
Youbo Wang, Zhiguang Tian, Xinyan Bi, Zhendong Niu
IJRR
2010
173views more  IJRR 2010»
13 years 7 months ago
Planning and Implementing Trajectories for Autonomous Underwater Vehicles to Track Evolving Ocean Processes Based on Predictions
Path planning and trajectory design for autonomous underwater vehicles (AUVs) is of great importance to the oceanographic research community because automated data collection is b...
Ryan N. Smith, Yi Chao, Peggy Li, David A. Caron, ...
CDC
2010
IEEE
130views Control Systems» more  CDC 2010»
13 years 3 months ago
Generalized efficiency bounds in distributed resource allocation
Game theory is emerging as a popular tool for distributed control of multiagent systems. In order to take advantage of these game theoretic tools the interactions of the autonomous...
Jason R. Marden, Tim Roughgarden
ECAI
2006
Springer
14 years 11 days ago
Computational Opinions
Existing approaches to knowledge representation and reasoning in the context of open systems either deal with "objective" knowledge or with beliefs. In contrast, there ha...
Felix A. Fischer, Matthias Nickles
BMCBI
2007
159views more  BMCBI 2007»
13 years 8 months ago
Computational genes: a tool for molecular diagnosis and therapy of aberrant mutational phenotype
Background: A finite state machine manipulating information-carrying DNA strands can be used to perform autonomous molecular-scale computations at the cellular level. Results: We ...
Israel Mark Martínez-Pérez, Gong Zha...