Sciweavers

2169 search results - page 395 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
TC
2002
13 years 8 months ago
On Transaction Processing with Partial Validation and Timestamp Ordering in Mobile Broadcast Environments
Conventional concurrency control protocols are inapplicable in mobile broadcast environments due to a number of constraints of wireless communications. Previous studies are focuse...
Victor C. S. Lee, Kwok-Wa Lam, Sang Hyuk Son, Eddi...
INFOCOM
2010
IEEE
13 years 7 months ago
Near-Optimal Power Control in Wireless Networks: A Potential Game Approach
—We study power control in a multi-cell CDMA wireless system whereby self-interested users share a common spectrum and interfere with each other. Our objective is to design a pow...
Ozan Candogan, Ishai Menache, Asuman E. Ozdaglar, ...
KBSE
2010
IEEE
13 years 7 months ago
RESISTing reliability degradation through proactive reconfiguration
Situated software systems are an emerging class of systems that are predominantly pervasive, embedded, and mobile. They are marked with a high degree of unpredictability and dynam...
Deshan Cooray, Sam Malek, Roshanak Roshandel, Davi...
VTC
2010
IEEE
145views Communications» more  VTC 2010»
13 years 7 months ago
Performance of Multihop Wireless Links over Generalized-K Fading Channels
— The performance of multihop links is studied in this contribution by both analysis and simulations, when communicating over Generalized-K (KG) fading channels. The performance ...
Jianfei Cao, Lie-Liang Yang, Zhangdui Zhong
PKDD
2010
Springer
179views Data Mining» more  PKDD 2010»
13 years 6 months ago
Gaussian Processes for Sample Efficient Reinforcement Learning with RMAX-Like Exploration
Abstract. We present an implementation of model-based online reinforcement learning (RL) for continuous domains with deterministic transitions that is specifically designed to achi...
Tobias Jung, Peter Stone