Sciweavers

451 search results - page 71 / 91
» Constrained Sums of Information Systems
Sort
View
ATAL
2007
Springer
14 years 2 months ago
Real-time agent characterization and prediction
Reasoning about agents that we observe in the world is challenging. Our available information is often limited to observations of the agent’s external behavior in the past and p...
H. Van Dyke Parunak, Sven Brueckner, Robert S. Mat...
OTM
2007
Springer
14 years 2 months ago
Network Coding Protocols for Secret Key Distribution
Abstract. Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in pa...
Paulo F. Oliveira, João Barros
VTC
2006
IEEE
166views Communications» more  VTC 2006»
14 years 2 months ago
TA-MAC: Task Aware MAC Protocol for Wireless Sensor Networks
Abstract— In wireless sensor networks (WSNs), reducing energy consumption of resource constrained sensor nodes is one of the most important issues. In this paper, we propose a ta...
Sangheon Pack, Jaeyoung Choi, Taekyoung Kwon, Yang...
ICMCS
2005
IEEE
153views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Improved semantic region labeling based on scene context
Semantic region labeling in outdoor scenes, e.g., identifying sky, grass, foliage, water, and snow, facilitates content-based image retrieval, organization, and enhancement. A maj...
Matthew R. Boutell, Jiebo Luo, Christopher M. Brow...
NCA
2005
IEEE
14 years 2 months ago
Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and Requirements
Context-aware applications rely on the ability to perceive the state of the surrounding environment. In this paper, we address a class of such applications where real-time guarant...
Malika Boulkenafed, Barbara Hughes, René Me...