Sciweavers

870 search results - page 51 / 174
» The failure detector abstraction
Sort
View
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 9 months ago
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
Abstract. As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application...
Feng Gu, Julie Greensmith, Uwe Aickelin
KI
2007
Springer
13 years 9 months ago
Visual Robot Localization and Mapping Based on Attentional Landmarks
Abstract. In this paper, we present a system for simultaneous localization and map building of a mobile robot, based on an attentional landmark detector. A biologically motivated a...
Simone Frintrop
CORR
2011
Springer
185views Education» more  CORR 2011»
13 years 4 months ago
Asymptotic Moments for Interference Mitigation in Correlated Fading Channels
Abstract—We consider a certain class of large random matrices, composed of independent column vectors with zero mean and different covariance matrices, and derive asymptotically ...
Jakob Hoydis, Mérouane Debbah, Mari Kobayas...
EUROPAR
2004
Springer
14 years 24 days ago
Enhancing Efficiency of Byzantine-Tolerant Coordination Protocols via Hash Functions
Abstract. Distributed protocols resilient to Byzantine failures are notorious to be costly from the computational and communication point of view. In this paper we discuss the role...
Daniela Tulone
ISQED
2005
IEEE
108views Hardware» more  ISQED 2005»
14 years 2 months ago
Error Analysis for the Support of Robust Voltage Scaling
Recently, a new Dynamic Voltage Scaling (DVS) scheme has been proposed that increases energy efficiency significantly by allowing the processor to operate at or slightly below the...
David Roberts, Todd M. Austin, David Blaauw, Trevo...