Sciweavers

4345 search results - page 761 / 869
» Temporal Constraint Networks
Sort
View
ICPPW
2006
IEEE
14 years 1 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
ICRA
2006
IEEE
111views Robotics» more  ICRA 2006»
14 years 1 months ago
Placement and Distributed Deployment of Sensor Teams for Triangulation based Localization
— We address the problem of placing a sensor network so as to minimize the uncertainty in estimating the position of targets. The novelty of our formulation is in the sensing mod...
Volkan Isler
PARELEC
2006
IEEE
14 years 1 months ago
Application-Driven Development of Concurrent Packet Processing Platforms
We have developed an application-driven methodology for implementing parallel and heterogeneous programmable platforms. We deploy our flow for network access platforms where we h...
Christian Sauer, Matthias Gries, Jörg-Christi...
VTC
2006
IEEE
14 years 1 months ago
Asymptotic Performance of Broadcast Services in IEEE 802.16e with CSTD
The IEEE 802.16e system for multicast and broadcast service (MBS) is further investigated over [4]. It is shown that 802.16e networks can exploit advanced transmission and flexibl...
Guocong Song, Kenneth Stewart, Robert Love, Xiangy...
NETGAMES
2006
ACM
14 years 1 months ago
Plug-replaceable consistency maintenance for multiplayer games
Consistency maintenance of replicated data in multiplayer games is a challenging issue due to the performance constraints of real-time interactive applications. We present an appr...
Robert D. S. Fletcher, T. C. Nicholas Graham, Chri...