Sciweavers

2111 search results - page 332 / 423
» How to Program Pervasive Systems
Sort
View
ICMCS
2007
IEEE
123views Multimedia» more  ICMCS 2007»
14 years 3 months ago
BOPPER: Wireless Video Broadcasting with Peer-to-Peer Error Recovery
Wireless digital video broadcasting has experienced much success in recent years with some industrial systems deployed. We study in this paper how to recover lost packets in video...
Shenjie Li, S.-H. Gary Chan
CIG
2005
IEEE
14 years 2 months ago
Pared-down Poker: Cutting to the Core of Command and Control
Poker poses cognitive challenges like those of warfare, business and other real world domains. This makes poker a good test bed for basic research on how people make Command and Co...
Kevin Burns
ATAL
2005
Springer
14 years 2 months ago
A BDI architecture for goal deliberation
One aspect of rational behavior is that agents can pursue multiple goals in parallel. Current BDI theory and systems do not provide a theoretical or architectural framework for de...
Alexander Pokahr, Lars Braubach, Winfried Lamersdo...
LCTRTS
2004
Springer
14 years 2 months ago
Link-time optimization of ARM binaries
The overhead in terms of code size, power consumption and execution time caused by the use of precompiled libraries and separate compilation is often unacceptable in the embedded ...
Bruno De Bus, Bjorn De Sutter, Ludo Van Put, Domin...
VIZSEC
2004
Springer
14 years 2 months ago
Visualizing windows executable viruses using self-organizing maps
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
InSeon Yoo