Sciweavers

672 search results - page 82 / 135
» Words and forbidden factors
Sort
View
GLOBECOM
2007
IEEE
14 years 3 months ago
An Enhanced RFID Multiple Access Protocol for Fast Inventory
- The relevant performance metric for successful deployment of Radio Frequency Identification (RFID) systems for tag inventory applications is the latency for reading all tags with...
You-Chang Ko, Sumit Roy, Joshua R. Smith, Hyung-Wo...
ICRA
2007
IEEE
203views Robotics» more  ICRA 2007»
14 years 3 months ago
Energy Saving Target Tracking Using Mobile Sensor Networks
Abstract Minimizing the energy consumption of target tracking using a mobile sensor network is proved to be NPcomplete. Based on proximity graph, an approximately optimal solution ...
Yingying Li, Yun-Hui Liu
INFOCOM
2007
IEEE
14 years 3 months ago
Routing, Anycast, and Multicast for Mesh and Sensor Networks
Abstract— This paper studies routing schemes and their distributed construction in limited wireless networks, such as sensor or mesh networks. We argue that the connectivity of s...
Roland Flury, Roger Wattenhofer
CASC
2007
Springer
108views Mathematics» more  CASC 2007»
14 years 2 months ago
Comprehensive Triangular Decomposition
We introduce the concept of comprehensive triangular decomposition (CTD) for a parametric polynomial system F with coefficients in a field. In broad words, this is a finite part...
Changbo Chen, Oleg Golubitsky, François Lem...
IFSA
2007
Springer
138views Fuzzy Logic» more  IFSA 2007»
14 years 2 months ago
Optimization to Manage Supply Chain Disruptions Using the NSGA-II
Disruption on a supply chain provokes lost that should be minimized looking for alternative suppliers. This solution involves a strategy to manage the impact of the disruption and ...
Víctor Serrano, Matías Alvarado, Car...