Sciweavers

986 search results - page 194 / 198
» Simulation Modeling of Weak-Consistency Protocols
Sort
View
STOC
1997
ACM
91views Algorithms» more  STOC 1997»
13 years 11 months ago
Lower Bounds for Distributed Coin-Flipping and Randomized Consensus
We examine a class of collective coin- ipping games that arises from randomized distributed algorithms with halting failures. In these games, a sequence of local coin ips is gener...
James Aspnes
ATAL
2009
Springer
13 years 11 months ago
Effective bidding and deal identification for negotiations in highly nonlinear scenarios
Most real-world negotiation scenarios involve multiple, interdependent issues. These scenarios are specially challenging because the agents' utility functions are nonlinear, ...
Ivan Marsá-Maestre, Miguel A. López-...
ICC
2007
IEEE
143views Communications» more  ICC 2007»
13 years 11 months ago
DARA: Delay-Aware Routing Algorithm in a Hybrid Wireless-Optical Broadband Access Network (WOBAN)
Abstract-- Hybrid wireless-optical broadband access network (WOBAN) is a promising architecture for future network operations. Recently, the wireless part of WOBAN has been gaining...
Suman Sarkar, Hong-Hsu Yen, Sudhir S. Dixit, Biswa...
ATAL
2010
Springer
13 years 8 months ago
Establishing spatially targeted communication in a heterogeneous robot swarm
We consider a heterogeneous swarm consisting of aerial and wheeled robots. We present a system that enables spatially targeted communication. Our system enables aerial robots to e...
Nithin Mathews, Anders Lyhne Christensen, Eliseo F...
AHSWN
2006
206views more  AHSWN 2006»
13 years 7 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch