Sciweavers

434 search results - page 45 / 87
» The Case for Browser Provenance
Sort
View
MSWIM
2004
ACM
14 years 2 months ago
Modeling wireless shadow networks
In case of natural disasters or intentional attacks, telecommunication networks often get heavily damaged and current resilience schemes have proven to be insufficient for rapid r...
Filip De Turck, Aurel A. Lazar
AI
2003
Springer
14 years 1 months ago
Stochastic Local Search for Multiprocessor Scheduling for Minimum Total Tardiness
The multi-processor total tardiness problem (MPTTP) is an ÆÈ-hard scheduling problem, in which the goal is to minimise the tardiness of a set of jobs that are processed on a numb...
Michael Pavlin, Holger H. Hoos, Thomas Stützl...
CDC
2009
IEEE
231views Control Systems» more  CDC 2009»
14 years 1 months ago
Design of observer-based controllers for LPV systems with unknown parameters
— Output-based feedback control of LPV systems is an important problem, as in practice it is rarely the case that the full state variable is available for feedback. In this paper...
W. P. M. H. Heemels, Jamal Daafouz, Gilles Milleri...
EMNETS
2007
14 years 18 days ago
Increasing the reliability of wireless sensor networks with a distributed testing framework
Designing Wireless Sensor Networks (WSNs) has proven to be a slow, tedious and error-prone process due to the inherent intricacies of designing a distributed, wireless, and embedd...
Matthias Woehrle, Christian Plessl, Jan Beutel, Lo...
E4MAS
2006
Springer
14 years 11 days ago
Exploiting the Environment for Coordinating Agent Intentions
One large and quite interesting family of MAS applications is characterized (1) by their large scale in terms of number of agents and physical distribution, (2) by their very dynam...
Tom Holvoet, Paul Valckenaers