Sciweavers

8658 search results - page 1553 / 1732
» Models of Command and Control
Sort
View
DIALM
2008
ACM
140views Algorithms» more  DIALM 2008»
15 years 4 months ago
Latency of opportunistic forwarding in finite regular wireless networks
In opportunistic forwarding, a node randomly relays packets to one of its neighbors based on local information, without the knowledge of global topology. Each intermediate node co...
Prithwish Basu, Chi-Kin Chau
DOCENG
2008
ACM
15 years 4 months ago
Enabling adaptive time-based web applications with SMIL state
In this paper we examine adaptive time-based web applications (or presentations). These are interactive presentations where time dictates the major structure, and that require int...
Jack Jansen, Dick C. A. Bulterman
DOCENG
2008
ACM
15 years 4 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
DOLAP
2008
ACM
15 years 4 months ago
Data mining-based fragmentation of XML data warehouses
With the multiplication of XML data sources, many XML data warehouse models have been proposed to handle data heterogeneity and complexity in a way relational data warehouses fail...
Hadj Mahboubi, Jérôme Darmont
ECAI
2008
Springer
15 years 4 months ago
Incremental Component-Based Construction and Verification of a Robotic System
Abstract-- Autonomous robots are complex systems that require the interaction/cooperation of numerous heterogeneous software components. Nowadays, robots are critical systems and m...
Ananda Basu, Matthieu Gallien, Charles Lesire, Tha...
« Prev « First page 1553 / 1732 Last » Next »