Sciweavers

ACCESS
2015
31views more  ACCESS 2015»
8 years 3 months ago
Managing Crowds in Hazards With Dynamic Grouping
—Emergency navigation algorithms for evacuees in confined spaces typically treat all evacuees in a homogeneous manner, using a common metric to select the best exit paths. In th...
Olumide J. Akinwande, Huibo Bi, Erol Gelenbe
ACCESS
2015
19views more  ACCESS 2015»
8 years 3 months ago
Multiuser Admission Control and Beamforming Optimization Algorithms for MISO Heterogeneous Networks
This paper investigates the problem of joint multiuser admission control and beamforming optimization for multiple input single-output heterogeneous networks (HetNets). Considered ...
Duy H. N. Nguyen, Long Bao Le, Tho Le-Ngoc
ACCESS
2015
6views more  ACCESS 2015»
8 years 3 months ago
Dosimetric Simulations of Brain Absorption of Mobile Phone Radiation-The Relationship Between psSAR and Age
As children develop, they differ from adults in a number of important ways, including anatomy, metabolism, immune system, and the extent of myelination of the nervous system. As a ...
Claudio Enrique Fernandez-Rodriguez, Alvaro A. A. ...
ACCESS
2015
23views more  ACCESS 2015»
8 years 3 months ago
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
—Wireless Sensor Networks (WSNs) are a prominent fundamental technology of the Internet of Things (IoT). Rather than device-to-device communications, group communications in the ...
Pawani Porambage, An Braeken, Corinna Schmitt, And...
ACAL
2015
Springer
8 years 3 months ago
Formalising Believability and Building Believable Virtual Agents
Believability is an important characteristic of intelligent virtual agents, however, very few attempts have been made to define and formalise it. This paper provides a formal anal...
Anton Bogdanovych, Tomas Trescak, Simeon J. Simoff
ACAL
2015
Springer
8 years 3 months ago
ALife Using Adaptive, Autonomous, and Individual Agent Control
Abstract. This is a review of three, agent control algorithm, replication experiments. In the 1948 essay, Intelligent Machinery, the English mathematician Alan Turing described an ...
Ovi Chris Rouly
TCCI
2016
8 years 3 months ago
Searching Web 2.0 Data Through Entity-Based Aggregation
Abstract. Entity-based searching has been introduced as a way of allowing users and applications to retrieve information about a specific real world object such as a person, an ev...
Ekaterini Ioannou, Yannis Velegrakis
LFCS
2016
Springer
8 years 3 months ago
Classical Logic with Mendler Induction - A Dual Calculus and Its Strong Normalization
We investigate (co-)induction in Classical Logic under the propositions-as-types paradigm, considering propositional, second-order, and (co-)inductive types. Specifically, we intr...
Marco Devesas Campos, Marcelo P. Fiore
LFCS
2016
Springer
8 years 3 months ago
Parallel Feedback Turing Computability
In contrast to most kinds of computability studied in mathematical logic, feedback computability has a non-degenerate notion of parallelism. Here we study parallelism for the most...
Robert S. Lubarsky
LFCS
2016
Springer
8 years 3 months ago
Adjoint Logic with a 2-Category of Modes
We generalize the adjoint logics of Benton and Wadler (1996) and Reed (2009) to allow multiple different adjunctions between the same categories. This provides insight into the str...
Daniel R. Licata, Michael Shulman