Sciweavers

1966 search results - page 334 / 394
» The Distributed Virtual Windtunnel
Sort
View
INFOCOM
2009
IEEE
14 years 4 months ago
Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks
Abstract—In wireless sensor networks, asynchronous sleepwake scheduling protocols can significantly reduce energy consumption without incurring the communication overhead for cl...
Joohwan Kim, Xiaojun Lin, Ness B. Shroff
INFOCOM
2009
IEEE
14 years 4 months ago
A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA Protocols
Abstract—This paper presents a protocol-independent approach to reveal a new insight into the performance of carrier sense multiple access with collision avoidance (CSMA/CA) prot...
Yu Cheng, Xinhua Ling, Weihua Zhuang
INFOCOM
2009
IEEE
14 years 4 months ago
Impacts of Peer Characteristics on P2PTV Networks Scalability
—A P2PTV system allows users to watch live video streams redistributed by other users via a peer-to-peer (P2P) network. In an ideal world, each peer in a P2P network would be abl...
Khaldoon Shami, Damien Magoni, Hyunseok Chang, Wen...
ATAL
2009
Springer
14 years 4 months ago
Pragmatic-strategic reputation-based decisions in BDI agents
Computational trust and reputation models have been recognized as one of the key technologies required to design and implement agent systems. These models manage and aggregate the...
Isaac Pinyol, Jordi Sabater-Mir
ICMI
2009
Springer
147views Biometrics» more  ICMI 2009»
14 years 4 months ago
Multimodal end-of-turn prediction in multi-party meetings
One of many skills required to engage properly in a conversation is to know the appropiate use of the rules of engagement. In order to engage properly in a conversation, a virtual...
Iwan de Kok, Dirk Heylen