Sciweavers

628 search results - page 101 / 126
» Scheduling Algorithm with Potential Behaviors
Sort
View
ISRR
2001
Springer
165views Robotics» more  ISRR 2001»
15 years 7 months ago
Human-Centered Robotics and Interactive Haptic Simulation
A new field of robotics is emerging. Robots are today moving towards applications beyond the structured environment of a manufacturing plant. They are making their way into the e...
Oussama Khatib, Oliver Brock, K. C. Chang, Diego C...
DIALM
2007
ACM
144views Algorithms» more  DIALM 2007»
15 years 6 months ago
Reliable Local Broadcast in a Wireless Network Prone to Byzantine Failures
Reliable broadcast can be a very useful primitive for many distributed applications, especially in the context of sensoractuator networks. Recently, the issue of reliable broadcas...
Vartika Bhandari, Nitin H. Vaidya
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 2 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
ACMICEC
2008
ACM
270views ECommerce» more  ACMICEC 2008»
15 years 4 months ago
Adaptive strategies for predicting bidding prices in supply chain management
Supply Chain Management (SCM) involves a number of interrelated activities from negotiating with suppliers to competing for customer orders and scheduling the manufacturing proces...
Yevgeniya Kovalchuk, Maria Fasli
154
Voted
ICANNGA
2007
Springer
191views Algorithms» more  ICANNGA 2007»
15 years 8 months ago
Novel Multi-layer Non-negative Tensor Factorization with Sparsity Constraints
In this paper we present a new method of 3D non-negative tensor factorization (NTF) that is robust in the presence of noise and has many potential applications, including multi-way...
Andrzej Cichocki, Rafal Zdunek, Seungjin Choi, Rob...