Sciweavers

2036 search results - page 360 / 408
» More on a model curriculum for modeling and simulation
Sort
View
JOIN
2006
113views more  JOIN 2006»
13 years 7 months ago
Local Detection of Selfish Routing Behavior in Ad Hoc Networks
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...
LISP
2006
105views more  LISP 2006»
13 years 7 months ago
Call-by-push-value: Decomposing call-by-value and call-by-name
We present the call-by-push-value (CBPV) calculus, which decomposes the typed call-by-value (CBV) and typed call-by-name (CBN) paradigms into fine-grain primitives. On the operatio...
Paul Blain Levy
PAMI
2008
132views more  PAMI 2008»
13 years 7 months ago
Trajectory Association across Multiple Airborne Cameras
A camera mounted on an aerial vehicle provides an excellent means to monitor large areas of a scene. Utilizing several such cameras on different aerial vehicles allows further flex...
Yaser Sheikh, Mubarak Shah
NN
2006
Springer
13 years 7 months ago
Use of a neuro-variational inversion for retrieving oceanic and atmospheric constituents from satellite ocean colour sensor: App
This paper presents a new development of the NeuroVaria method. NeuroVaria computes relevant atmospheric and oceanic parameters by minimizing the difference between the observed s...
Julien Brajard, Cédric Jamet, Cyril Moulin,...
JNW
2007
86views more  JNW 2007»
13 years 7 months ago
Reliable Actuation in Sensor Networks
Abstract—We present a protocol that uses a publish/subscribe approach to perform reliable but efficient actuation over a sensor network whose topology may change. Actuation on a...
Sean Rooney, Luis Garcés-Erice