Sciweavers

2861 search results - page 485 / 573
» Constraint Programming
Sort
View
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
14 years 2 months ago
Security when people matter: structuring incentives for user behavior
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives p...
Rick Wash, Jeffrey K. MacKie-Mason
TWC
2008
98views more  TWC 2008»
13 years 10 months ago
Resource Allocation for Delay Differentiated Traffic in Multiuser OFDM Systems
Abstract-- Most existing work on adaptive allocation of subcarriers and power in multiuser OFDM systems has focused on homogeneous traffic consisting of delay-constrained data (gua...
Meixia Tao, Ying-Chang Liang, Fan Zhang
GLOBECOM
2010
IEEE
13 years 8 months ago
Prolonging Network Lifetime via a Controlled Mobile Sink in Wireless Sensor Networks
In this paper we explore the mobility of a mobile sink in a wireless sensor network (WSN) to prolong the network lifetime. Since the mechanical movement of mobile sink is driven by...
Weifa Liang, Jun Luo, Xu Xu
ATAL
2007
Springer
14 years 4 months ago
Commitment-driven distributed joint policy search
Decentralized MDPs provide powerful models of interactions in multi-agent environments, but are often very difficult or even computationally infeasible to solve optimally. Here we...
Stefan J. Witwicki, Edmund H. Durfee
AUIC
2006
IEEE
14 years 4 months ago
Implementing a natural user interface for camera phones using visual tags
Pointing is a natural way of communicating. Children in all cultures use pointing inherently. Attaching tags to our environment enables interaction by pointing. Visual tags are a g...
Sanni Siltanen, Jouko Hyväkkä