Sciweavers

1345 search results - page 239 / 269
» Optimal Control With Noisy Time
Sort
View
ANTSW
2008
Springer
15 years 5 months ago
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol
Design and development of routing protocols for Mobile Ad Hoc Networks (MANETs) is an active area of research. The standard practice among researchers working in this emerging doma...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
143
Voted
ASMTA
2008
Springer
100views Mathematics» more  ASMTA 2008»
15 years 5 months ago
A Tandem Queueing Model for Delay Analysis in Disconnected Ad Hoc Networks
Ad hoc network routing protocols may fail to operate in the absence of an end-to-end connection from source to destination. This deficiency can be resolved by so-called delay-toler...
Ahmad Al Hanbali, Roland de Haan, Richard J. Bouch...
164
Voted
EMS
2008
IEEE
15 years 5 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
DATESO
2007
157views Database» more  DATESO 2007»
15 years 5 months ago
Index-Based Approach to Similarity Search in Protein and Nucleotide Databases
When searching databases of nucleotide or protein sequences, finding a local alignment of two sequences is one of the main tasks. Since the sizes of available databases grow const...
David Hoksza, Tomás Skopal
IJCAI
2007
15 years 5 months ago
Online Speed Adaptation Using Supervised Learning for High-Speed, Off-Road Autonomous Driving
The mobile robotics community has traditionally addressed motion planning and navigation in terms of steering decisions. However, selecting the best speed is also important – be...
David Stavens, Gabriel Hoffmann, Sebastian Thrun