Sciweavers

813 search results - page 126 / 163
» Pipeline-centric provenance model
Sort
View
AI
2004
Springer
13 years 7 months ago
On the computational complexity of qualitative coalitional games
We study coalitional games in which agents are each assumed to have a goal to be achieved, and where the characteristic property of a coalition is a set of choices, with each choi...
Michael Wooldridge, Paul E. Dunne
TWC
2008
176views more  TWC 2008»
13 years 7 months ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...
MJ
2007
87views more  MJ 2007»
13 years 7 months ago
Using SAT-based techniques in power estimation
Recent algorithmic advances in Boolean satisfiability (SAT), along with highly efficient solver implementations, have enabled the successful deployment of SAT technology in a wi...
Assim Sagahyroon, Fadi A. Aloul
ICASSP
2010
IEEE
13 years 6 months ago
Flexible complex ICA of fMRI data
Data-driven analysis methods, in particular independent component analysis (ICA) has proven quite useful for the analysis of functional magnetic imaging (fMRI) data. In addition, ...
Hualiang Li, Tülay Adali, Nicolle M. Correa, ...
ICRA
2010
IEEE
134views Robotics» more  ICRA 2010»
13 years 6 months ago
Design of guaranteed safe maneuvers using reachable sets: Autonomous quadrotor aerobatics in theory and practice
— For many applications, the control of a complex nonlinear system can be made easier by modeling the system as a collection of simplified hybrid modes, each representing a part...
Jeremy H. Gillula, Haomiao Huang, Michael P. Vitus...