Sciweavers

1033 search results - page 131 / 207
» Properties of Exercise Strategies
Sort
View
AUTOMATICA
1999
84views more  AUTOMATICA 1999»
15 years 3 months ago
Optimizing the receiver maneuvers for bearings-only tracking
This paper deals with the optimization of the observer trajectory for target motion analysis. The observations are made of estimated bearings. The problem consists in determining ...
Jean-Pierre Le Cadre, S. Laurent-Michel
P2P
2010
IEEE
135views Communications» more  P2P 2010»
15 years 2 months ago
QoE in Pull Based P2P-TV Systems: Overlay Topology Design Tradeoffs
Abstract—This paper presents a systematic performance analysis of pull P2P video streaming systems for live applications, providing guidelines for the design of the overlay topol...
R. Fortuna, Emilio Leonardi, Marco Mellia, Michela...
DALT
2010
Springer
14 years 11 months ago
Executing Specifications of Social Reasoning Agents
Social reasoning theories, whilst studied extensively in the area of multiagent systems, are hard to implement directly in agents. They often specify properties of beliefs or behav...
Iain Wallace, Michael Rovatsos
CHI
2011
ACM
14 years 7 months ago
The reading desk: applying physical interactions to digital documents
Reading is increasingly being performed interactively on-screen; for instance, new novels are now routinely released in electronic format for viewing on PCs and mobile devices. Un...
Jennifer Pearson, George Buchanan, Harold W. Thimb...
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
14 years 4 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert