Sciweavers

1928 search results - page 293 / 386
» Integrity Constraints in OWL
Sort
View
ICC
2007
IEEE
160views Communications» more  ICC 2007»
14 years 4 months ago
Opportunistic Cooperation for Quality of Service Provisionings Over Wireless Relay Networks
Abstract— We propose the QoS-driven opportunistic cooperation schemes for the wireless relay networks. By integrating information theory with the concept of effective capacity, o...
Lin Xie, Xi Zhang
ICC
2007
IEEE
146views Communications» more  ICC 2007»
14 years 4 months ago
A Delay-Constrained Shared Mesh Restoration Scheme
—We present a multi-constrained routing algorithm, called Delay-constrained Pool Sharing (DPS), in a survivable mesh network. The goal of this algorithm is to find a pair of link...
Hassan Naser, Ming Gong
ICDCSW
2007
IEEE
14 years 4 months ago
Exploiting Gossip for Self-Management in Scalable Event Notification Systems
1 Challenges of scale have limited the development of event notification systems with strong properties, despite the urgent demand for consistency, reliability, security, and other...
Ken Birman, Anne-Marie Kermarrec, Krzysztof Ostrow...
ICRA
2007
IEEE
165views Robotics» more  ICRA 2007»
14 years 4 months ago
Adaptive Sampling for Estimating a Scalar Field using a Robotic Boat and a Sensor Network
Abstract— This paper introduces an adaptive sampling algorithm for a mobile sensor network to estimate a scalar field. The sensor network consists of static nodes and one mobile...
Bin Zhang, Gaurav S. Sukhatme
IROS
2007
IEEE
134views Robotics» more  IROS 2007»
14 years 4 months ago
From path to trajectory deformation
Abstract— Path deformation is a technique that was introduced to generate robot motion wherein a path, that has been computed beforehand, is continuously deformed on-line in resp...
Hanna Kurniawati, Thierry Fraichard