• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 146
Next 10 →

For members only: Local and robust group management in dtns

by Samuel C. Nelson, Robin Kravets - In In Proc. ACM Mobicom CHANTS workshop , 2010
"... Effectivelyutilizinggroupsindelaytolerantnetworks(DTNs) can both improve the throughput of unicast routing protocols and open the door for a wide range of paradigms, such as anycast and multicast. Unfortunately, in DTN environments, there is no centralized entity that can quickly and reliably transm ..."
Abstract - Cited by 4 (2 self) - Add to MetaCart
transmit group membership lists, and hence group information must be disseminated through unreliable and potentially malicious nodes. In this paper, we propose a local and robust group information dissemination and consolidation protocol, called MembersOnly, that both quickly and accurately transmits group

Robot Formations Using Only Local Sensing and Control

by Maja J Matari'cy
"... Abstract We study the problem of achieving global behavior in a group of robots using only local sensing and interaction, in the context of formations, where the goal is to have N mobile robots establish and maintain some predetermined geometric shape. We have devised a simple, general, robust, loca ..."
Abstract - Add to MetaCart
Abstract We study the problem of achieving global behavior in a group of robots using only local sensing and interaction, in the context of formations, where the goal is to have N mobile robots establish and maintain some predetermined geometric shape. We have devised a simple, general, robust

ROBUST VIRTUAL ENERGY KEY MANAGEMENT BASED LOCATION VERIFICATION SYSTEM FOR WSN

by K Rajesh , S Manikandan
"... Abstract: Localization in wireless sensor networks, i.e., knowing the location of sensor nodes, is very important for many applications such as environment monitoring, target tracking, and geographical routing. Since wireless sensor networks may be deployed in hostile environment, sensors' loc ..."
Abstract - Add to MetaCart
' localization is subjected to many malicious attacks. Therefore, sensors' locations are not trstworthy and need to be verified before they can be used by location-based applications. Previous verification schemes either require group-based deployment knowledge of the sensor field, or depend on expensive

Robustness of spontaneous pattern formation in spatially distributed genetic populations

by M A M De Aguiar , M Baranger , Y Bar-Yam , H Sayama - Brazilian Journal of Physics , 2003
"... Spatially distributed genetic populations that compete locally for resources and mate only with sufficiently close neighbors, may give rise to spontaneous pattern formation. Depending on the population parameters, like death rate per generation and size of the competition and mating neighborhoods, ..."
Abstract - Cited by 4 (2 self) - Add to MetaCart
Spatially distributed genetic populations that compete locally for resources and mate only with sufficiently close neighbors, may give rise to spontaneous pattern formation. Depending on the population parameters, like death rate per generation and size of the competition and mating neighborhoods

Local Dimensionality Reduction for Non-Parametric Regression

by Heiko Hoffmann, Stefan Schaal, Sethu Vijayakumar, H. Hoffmann, S. Schaal , 2009
"... Abstract Locally-weighted regression is a computationally-efficient technique for non-linear regression. However, for high-dimensional data, this technique becomes numerically brittle and computationally too expensive if many local models need to be maintained simultaneously. Thus, local linear dime ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
contains principal component analysis (PCA) in joint input and output space, factor analysis, and probabilistic PCA; and group 3 contains reduced rank regression (RRR) and partial least squares (PLS) regression. Among the tested methods, only group 3 managed to achieve robust performance even for a non

Once-and-Forall Management Protocol (OFMP)

by Sandeep Kulkarni, Anish Arora - Proceedings of the Fifth International Conference on Network Protocols , 1997
"... OFMP is a hierarchical, network management protocol that enables group operations to be executed on the management information bases of all nodes in the group. As long as no faults occur, OFMP ensures that all nodes execute their local operation exactly once in each group operation. If "immedia ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
OFMP is a hierarchical, network management protocol that enables group operations to be executed on the management information bases of all nodes in the group. As long as no faults occur, OFMP ensures that all nodes execute their local operation exactly once in each group operation. If "

Finding groups in gene expression data

by David J Hand , Nicholas A Heard - J Biomed Biotechnol
"... The vast potential of the genomic insight offered by microarray technologies has led to their widespread use since they were introduced a decade ago. Application areas include gene function discovery, disease diagnosis, and inferring regulatory networks. Microarray experiments enable large-scale, h ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
is the classification of cancer types (Golub et al [1], Alizadeh et al A common aim, then, is to use the gene expression profiles to identify groups of genes or samples in which the members behave in similar ways. In fact, that task description encompasses several distinct types of objectives. Firstly, one might want

Databases and Distributed Systems Group, TU Darmstadt, Germany,

by Kai Sachs, Samuel Kounev, Jean Bacon, Ro Buchmann
"... Message-oriented middleware (MOM) is at the core of a vast number of financial services and telco applications, and is gaining increasing traction in other industries, such as manufacturing, transportation, health-care and supply chain management. Novel messaging applications, however, pose some ser ..."
Abstract - Add to MetaCart
Message-oriented middleware (MOM) is at the core of a vast number of financial services and telco applications, and is gaining increasing traction in other industries, such as manufacturing, transportation, health-care and supply chain management. Novel messaging applications, however, pose some

Robust performance of Cooperative Cache wireless P2P Networks Architecture and Algorithm

by unknown authors
"... Abstract:Mobile ad hoc networks have potentialapplications in civilian and militaryenvironments such as disaster recoveryefforts, group conferences, wirelessoffices, mobile info-stations (intourist centers, restaurants, and so on), and battlefieldmaneuvers, making them a focus of currentresearch.Coo ..."
Abstract - Add to MetaCart
Abstract:Mobile ad hoc networks have potentialapplications in civilian and militaryenvironments such as disaster recoveryefforts, group conferences, wirelessoffices, mobile info-stations (intourist centers, restaurants, and so on), and battlefieldmaneuvers, making them a focus of currentresearch

The Local Dominance Effect in Self-Evaluation: Evidence and Explanations

by Ethan Zell , Zell Mark D Alicke , M. D. ( E Alicke - THE IMPACT OF LOCAL COMPARISONS 33 , 2010
"... Abstract: The local dominance effect is the tendency for comparisons with a few, discrete individuals to have a greater influence on self-assessments than comparisons with larger aggregates. This review presents a series of recent studies that demonstrate the local dominance effect. The authors off ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
in their local communities. Even now, with access to television and the World Wide Web, people live, work, and associate with local group members on a daily basis. It makes sense, therefore, that people's evaluations and emotions would be more influenced by how they fare in relation to a small group
Next 10 →
Results 1 - 10 of 146
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University