Sciweavers

24286 search results - page 4796 / 4858
» Research as Design-Design as Research
Sort
View
ITIIS
2010
129views more  ITIIS 2010»
13 years 5 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
JCAL
2010
101views more  JCAL 2010»
13 years 5 months ago
How East Asian classrooms may change over the next 20 years
Our schools have been experiencing three overlapping waves of technology adoption since the mid-1980s: the personal computer lab wave, the online learning wave, and the digital cl...
Tak-Wai Chan
JFR
2010
94views more  JFR 2010»
13 years 5 months ago
Passive sensor evaluation for unmanned ground vehicle mud detection
Detecting mud hazards is a significant challenge to unmanned ground vehicle (UGV) autonomous offroad navigation. A military UGV stuck in a mud body during a mission may need to be...
Arturo L. Rankin, Larry H. Matthies
JIPS
2010
389views more  JIPS 2010»
13 years 5 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed
JMLR
2010
148views more  JMLR 2010»
13 years 5 months ago
A Generalized Path Integral Control Approach to Reinforcement Learning
With the goal to generate more scalable algorithms with higher efficiency and fewer open parameters, reinforcement learning (RL) has recently moved towards combining classical tec...
Evangelos Theodorou, Jonas Buchli, Stefan Schaal
« Prev « First page 4796 / 4858 Last » Next »