Sciweavers

2846 search results - page 282 / 570
» Real World Teleconferencing
Sort
View
ADHOC
2007
73views more  ADHOC 2007»
13 years 9 months ago
A survey on real-world implementations of mobile ad-hoc networks
Simulation and emulation are valuable techniques for the evaluation of algorithms and protocols used in mobile ad-hoc networks. However, these techniques always require the simpli...
Wolfgang Kieß, Martin Mauve
ASC
2007
13 years 9 months ago
Development of a soft computing-based framework for engineering design optimisation with quantitative and qualitative search spa
Most real world engineering design optimisation approaches reported in the literature aim to find the best set of solutions using computationally expensive quantitative (QT ) mode...
Victor Oduguwa, Rajkumar Roy, Didier Farrugia
AUTOMATICA
2008
74views more  AUTOMATICA 2008»
13 years 9 months ago
Policy iteration based feedback control
It is well known that stochastic control systems can be viewed as Markov decision processes (MDPs) with continuous state spaces. In this paper, we propose to apply the policy iter...
Kan-Jian Zhang, Yan-Kai Xu, Xi Chen, Xi-Ren Cao
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 9 months ago
An Object-Oriented Metamodel for Bunge-Wand-Weber Ontology
A UML based metamodel for Bunge-Wand-Weber (BWW) ontology is presented. BWW ontology is a generic framework for analysis and conceptualization of real world objects. It includes c...
Arvind W. Kiwelekar, Rushikesh K. Joshi
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 9 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith