Sciweavers

1920 search results - page 143 / 384
» The Range Constraint: Algorithms and Implementation
Sort
View
CLIMA
2007
15 years 5 months ago
Language Constructs for Multi-agent Programming
Abstract. In this paper we are concerned with proposing, analyzing and implementing simple, yet flexible, constructs for multi-agent programming. In particular, we wish to extend ...
Louise A. Dennis, Michael Fisher, Anthony Hepple
INFOCOM
2012
IEEE
13 years 6 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
CORR
2007
Springer
118views Education» more  CORR 2007»
15 years 4 months ago
Discriminated Belief Propagation
— Decisions on sources with memory transmitted over independent channels can be taken by employing trellis calculations. In this paper, it is shown that for a certain class of fu...
Uli Sorger
SECON
2010
IEEE
15 years 2 months ago
Multi-Constrained Anypath Routing in Wireless Mesh Networks
Anypath routing has been proposed to improve the performance of unreliable wireless networks by exploiting the spatial diversity and broadcast nature of the wireless medium. In thi...
Xi Fang, Dejun Yang, Pritam Gundecha, Guoliang Xue
ALGORITHMICA
2000
125views more  ALGORITHMICA 2000»
15 years 3 months ago
Mobile Robot Self-Localization without Explicit Landmarks
Localization is the process of determining the robot's location within its environment. More precisely, it is a procedure which takes as input a geometric map, a current estim...
R. G. Brown, Bruce Randall Donald