Sciweavers

251 search results - page 30 / 51
» The main name system: an exercise in centralized computing
Sort
View
HPDC
1998
IEEE
13 years 11 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
AAAI
2007
13 years 10 months ago
Dominance and Equivalence for Sensor-Based Agents
This paper describes recent results from the robotics community that develop a theory, similar in spirit to the theory of computation, for analyzing sensor-based agent systems. Th...
Jason M. O'Kane, Steven M. LaValle
P2P
2003
IEEE
205views Communications» more  P2P 2003»
14 years 25 days ago
Peer-to-Peer Spatial Queries in Sensor Networks
Sensor networks, that consist of potentially several thousands of nodes each with sensing (heat, sound, light, magnetism, etc.) and wireless communication capabilities, provide gr...
Murat Demirbas, Hakan Ferhatosmanoglu
IUI
2003
ACM
14 years 24 days ago
An experiment in automated humorous output production
Computational humor will be needed in interfaces, no less than other cognitive capabilities. There are many practical settings where computational humor will add value. Among them...
Oliviero Stock, Carlo Strapparava
GECCO
2005
Springer
163views Optimization» more  GECCO 2005»
14 years 1 months ago
An artificial immune system algorithm for CDMA multiuser detection over multi-path channels
Based on the Antibody Clonal Selection Theory of immunology, we put forward a novel clonal selection algorithm for multiuser detection in Code-division Multiple-access Systems. By...
Maoguo Gong, Ling Wang, Licheng Jiao, Haifeng Du