Sciweavers

296 search results - page 58 / 60
» Empirical Evaluation of Distributed Mutual Exclusion Algorit...
Sort
View
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
14 years 1 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
ISWC
2006
IEEE
14 years 1 months ago
Discovering Characteristic Actions from On-Body Sensor Data
We present an approach to activity discovery, the unsupervised identification and modeling of human actions embedded in a larger sensor stream. Activity discovery can be seen as ...
David Minnen, Thad Starner, Irfan A. Essa, Charles...
ATAL
2006
Springer
13 years 11 months ago
A utility-based sensing and communication model for a glacial sensor network
This paper reports on the development of a utility-based mechanism for managing sensing and communication in cooperative multi-sensor networks. The specific application considered...
Paritosh Padhy, Rajdeep K. Dash, Kirk Martinez, Ni...
UAI
2008
13 years 8 months ago
Dyna-Style Planning with Linear Function Approximation and Prioritized Sweeping
We consider the problem of efficiently learning optimal control policies and value functions over large state spaces in an online setting in which estimates must be available afte...
Richard S. Sutton, Csaba Szepesvári, Alborz...
ASE
2007
143views more  ASE 2007»
13 years 7 months ago
Composition inference for UML class diagrams
Knowing which associations are compositions is important in a tool for the reverse engineering of UML class diagrams. Firstly, recovery of composition relationships bridges the ga...
Ana Milanova