Sciweavers

403 search results - page 78 / 81
» Plenoptic path and its applications
Sort
View
ADHOC
2007
144views more  ADHOC 2007»
13 years 8 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac
AROBOTS
2008
77views more  AROBOTS 2008»
13 years 8 months ago
Extending obstacle avoidance methods through multiple parameter-space transformations
Obstacle avoidance methods approach the problem of mobile robot autonomous navigation by steering the robot in real-time according to the most recent sensor readings, being suitab...
Jose-Luis Blanco, Javier Gonzalez, Juan-Antonio Fe...
BMCBI
2010
175views more  BMCBI 2010»
13 years 8 months ago
The BridgeDb framework: standardized access to gene, protein and metabolite identifier mapping services
Background: Many complementary solutions are available for the identifier mapping problem. This creates an opportunity for bioinformatics tool developers. Tools can be made to fle...
Martijn P. van Iersel, Alexander R. Pico, Thomas K...
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 8 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
CORR
2006
Springer
160views Education» more  CORR 2006»
13 years 7 months ago
Frugality ratios and improved truthful mechanisms for vertex cover
In set-system auctions, there are several overlapping teams of agents, and a task that can be completed by any of these teams. The auctioneer's goal is to hire a team and pay...
Edith Elkind, Leslie Ann Goldberg, Paul W. Goldber...