Sciweavers

6833 search results - page 152 / 1367
» Some two-character sets
Sort
View
ICPPW
2009
IEEE
15 years 2 months ago
A Security-Aware Approach to JXTA-Overlay Primitives
The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its desig...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
ICRA
2009
IEEE
106views Robotics» more  ICRA 2009»
15 years 2 months ago
On-line planning of nonholonomic trajectories in crowded and geometrically unknown environments
Navigation of a car-like robot in environments with unknowns requires effective on-line planning of nonholonomic trajectories. We propose a set of basic maneuver patterns based on ...
Yanbo Li, Jing Xiao
ICTAI
2009
IEEE
15 years 2 months ago
Merging Qualitative Constraint Networks in a Piecewise Fashion
We address the problem of merging qualitative constraints networks (QCNs). We point out a merging algorithm which computes a consistent QCN representing a global view of the input...
Jean-François Condotta, Souhila Kaci, Pierr...
CORR
2010
Springer
39views Education» more  CORR 2010»
15 years 1 months ago
Non-redundant random generation from weighted context-free languages
We address the non-redundant random generation of k words of length n from a context-free language. Additionally, we want to avoid a predefined set of words. We study the limits of...
Yann Ponty
GLOBECOM
2010
IEEE
15 years 1 months ago
Multicast Advance Reservation RWA Heuristics in Wavelength-Routed Networks
In this paper we investigate the static multicast advance reservation (MCAR) problem for all-optical wavelengthrouted WDM networks. Advance reservation connection requests specify ...
Neal Charbonneau, Vinod Vokkarane