Sciweavers

8658 search results - page 1553 / 1732
» Models of Command and Control
Sort
View
DIALM
2008
ACM
140views Algorithms» more  DIALM 2008»
13 years 11 months ago
Latency of opportunistic forwarding in finite regular wireless networks
In opportunistic forwarding, a node randomly relays packets to one of its neighbors based on local information, without the knowledge of global topology. Each intermediate node co...
Prithwish Basu, Chi-Kin Chau
DOCENG
2008
ACM
13 years 11 months ago
Enabling adaptive time-based web applications with SMIL state
In this paper we examine adaptive time-based web applications (or presentations). These are interactive presentations where time dictates the major structure, and that require int...
Jack Jansen, Dick C. A. Bulterman
DOCENG
2008
ACM
13 years 11 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
DOLAP
2008
ACM
13 years 11 months ago
Data mining-based fragmentation of XML data warehouses
With the multiplication of XML data sources, many XML data warehouse models have been proposed to handle data heterogeneity and complexity in a way relational data warehouses fail...
Hadj Mahboubi, Jérôme Darmont
ECAI
2008
Springer
13 years 11 months ago
Incremental Component-Based Construction and Verification of a Robotic System
Abstract-- Autonomous robots are complex systems that require the interaction/cooperation of numerous heterogeneous software components. Nowadays, robots are critical systems and m...
Ananda Basu, Matthieu Gallien, Charles Lesire, Tha...
« Prev « First page 1553 / 1732 Last » Next »