Sciweavers

2861 search results - page 504 / 573
» Constraint Programming
Sort
View
INFOCOM
2003
IEEE
14 years 3 months ago
Optimal Bandwidth Reservation Schedule in Cellular Network
Abstract— Efficient bandwidth allocation strategy with simultaneous fulfillment of QoS requirement of a user in a mobile cellular network is still a critical and an important p...
Samrat Ganguly, B. R. Badrinath, Navin Goyal
INFOVIS
2003
IEEE
14 years 3 months ago
A Visual Workspace for Hybrid Multidimensional Scaling Algorithms
In visualising multidimensional data, it is well known that different types of data require different types of algorithms to process them. Data sets might be distinguished accordi...
Greg Ross, Matthew Chalmers
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
14 years 3 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
VR
2003
IEEE
163views Virtual Reality» more  VR 2003»
14 years 3 months ago
Ribbon Networks for Modeling Navigable Paths of Autonomous Agents in Virtual Urban Environments
This paper presents a real-time database modeling complex networks of intersecting roads and walkways in urban virtual environments. The database represents information about the ...
Peter Willemsen, Joseph K. Kearney, Hongling Wang
ATAL
2003
Springer
14 years 3 months ago
Constructing optimal policies for agents with constrained architectures
Optimal behavior is a very desirable property of autonomous agents and, as such, has received much attention over the years. However, making optimal decisions and executing optima...
Dmitri A. Dolgov, Edmund H. Durfee