Sciweavers

374 search results - page 52 / 75
» Lower-bounded facility location
Sort
View
CCR
2004
90views more  CCR 2004»
13 years 9 months ago
A constraint satisfaction approach to testbed embedding services
Today's networking community is becoming increasingly skeptical of the significance of research results founded wholly upon experimental results conducted in simulation. Now, ...
Jeffrey Considine, John W. Byers, Ketan Meyer-Pate...
TMC
2010
138views more  TMC 2010»
13 years 7 months ago
Distributed Relay-Assignment Protocols for Coverage Expansion in Cooperative Wireless Networks
—One important application of cooperative communications is to extend coverage area in wireless networks without increasing infrastructure. However, a crucial challenge in implem...
Ahmed K. Sadek, Zhu Han, K. J. Ray Liu
CORR
2012
Springer
229views Education» more  CORR 2012»
12 years 4 months ago
Cops and Invisible Robbers: the Cost of Drunkenness
We examine a version of the Cops and Robber (CR) game in which the robber is invisible, i.e., the cops do not know his location until they capture him. Apparently this game (CiR) h...
Athanasios Kehagias, Dieter Mitsche, Pawel Pralat
EUROCAST
1994
Springer
139views Hardware» more  EUROCAST 1994»
14 years 1 months ago
Illustrating Constraint Programming Systems in Logistic Planning
Logistic systems analysts use a wide array of modeling systems such as algebraic and logic programs. Two simple examples show how they mesh as Constraint Logic programs, emphasizin...
Jean-Michel Thizy
SIGUCCS
2000
ACM
14 years 18 days ago
Strategic Partnerships for Managing Labs
At Iowa State University, the Office of Academic Information Technologies, the English Department, and the Department of Residence have developed a strategic alliance to plan and ...
Linda J. Hutchison, Dennis J. Engholm