Sciweavers

360 search results - page 49 / 72
» Precision-at-ten considered redundant
Sort
View
WOWMOM
2005
ACM
195views Multimedia» more  WOWMOM 2005»
14 years 29 days ago
Exploiting MAC Flexibility in WiMAX for Media Streaming
The IEEE 802.16 standard (commonly known as WiMAX) which has emerged as a broadband wireless access technology, is capable of delivering very high data rates. However, providing p...
Shamik Sengupta, Mainak Chatterjee, Samrat Ganguly...
GECCO
2004
Springer
14 years 23 days ago
Inflight Rerouting for an Unmanned Aerial Vehicle
The availability of new information can often necessitate rerouting of a vehicle. In [1], the set of nonoverlapping useful vicinities of the reconnaissance sites, S, and the 3D spa...
Amit Agarwal, Meng-Hiot Lim, Maung Ye Win Kyaw, Me...
ISER
2004
Springer
158views Robotics» more  ISER 2004»
14 years 23 days ago
Collective Inspection of Regular Structures using a Swarm of Miniature Robots
We present a series of experiments concerned with the inspection of regular, engineered structures carried out using swarms of five to twenty autonomous, miniature robots, solely ...
Nikolaus Correll, Alcherio Martinoli
ACSAC
2003
IEEE
14 years 21 days ago
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...
IPPS
2003
IEEE
14 years 20 days ago
An Extended Link Reversal Protocol in Dynamic Networks
— We consider the problem of maintaining routing paths between nodes in a dynamic network. Gafni and Bertsekas proposed a link reversal approach called the BG method that maintai...
Jie Wu, Fei Dai