• Aucun résultat trouvé

[PDF] Top 20 MCCM: an approach for connectivity and coverage maximization

Has 10000 "MCCM: an approach for connectivity and coverage maximization" found on our website. Below are the top 20 most common "MCCM: an approach for connectivity and coverage maximization".

MCCM: an approach for connectivity and coverage maximization

MCCM: an approach for connectivity and coverage maximization

... academic and industrial ...networking and processing to communicate with ubiquitous objects and ...powered and randomly deployed, their long-term availability and connectivity ... Voir le document complet

17

Composable core-sets for diversity and coverage maximization

Composable core-sets for diversity and coverage maximization

... data and then perform further processing only on the representation ...This approach significantly reduces the cost of processing, communicating and storing the data, as the representation size can ... Voir le document complet

10

Communication coverage for independently moving robots

Communication coverage for independently moving robots

... centralized and decentralized approaches for connectivity maintenance amongst single or multiple moving robots have been investigated in the literature, mostly where control or cooperation of ... Voir le document complet

9

Comparative genomics approach to evolutionary process connectivity

Comparative genomics approach to evolutionary process connectivity

... traits and historical demography on contem- porary connectivity is still poorly ...Genetic connectivity and its evolutionary outcomes depend on a variety of spatially dependent evolutionary ... Voir le document complet

16

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks

... is coverage. In general, coverage can be considered as the measure of quality of service provided by a WSN ...the coverage. However, it is difficult to ensure a WSN without coverage holes ... Voir le document complet

7

Martingale Optimal Transport and Utility Maximization

Martingale Optimal Transport and Utility Maximization

... wrong, and that, even in our simple exponential utility framework, the robust utility indifference price turns out to be given by the robust hedging cost of some conveniently modified ... Voir le document complet

155

Empirical performance maximization for linear rank statistics

Empirical performance maximization for linear rank statistics

... 1 Introduction In the context of ranking, several performance measures may be considered. Even in the simplest framework of bipartite ranking, where a binary label is available, there is not one and only natural ... Voir le document complet

10

Optimality Conditions for Piecewise-Convex Maximization Problems

Optimality Conditions for Piecewise-Convex Maximization Problems

... Unit´e de recherche INRIA Lorraine, Technopˆole de Nancy-Brabois, Campus scientifique, ` NANCY 615 rue du Jardin Botanique, BP 101, 54600 VILLERS LES Unit´e de recherche INRIA Rennes, Ir[r] ... Voir le document complet

24

Bridging Utility Maximization and Regret Minimization

Bridging Utility Maximization and Regret Minimization

... theorem and lemma are stated for pure ...UD and RM need more careful ...strategies for regret minimizers, the only change needed is to allow such a minimizer to choose a mixed strategy that ... Voir le document complet

11

The STEP standard as an approach for design and prototyping

The STEP standard as an approach for design and prototyping

... is an ISO standard (ISO-10303) for the computer- interpretable representation and exchange of product ...structures and usage of information in generic or specific ...is an evolutionary ... Voir le document complet

7

Soa Antipatterns: an Approach for their Specification and Detection

Soa Antipatterns: an Approach for their Specification and Detection

... WsdlCompiler, and BPELEngine} as No- body Home, sca-parser as The Knot, and {MembraneGeneration, TypeFactory, and Processor } as involved in a Service ...sensors and triggers (see section ... Voir le document complet

31

Cache Policies for Linear Utility Maximization

Cache Policies for Linear Utility Maximization

... REEDY and OSA, the most natural approach is to keep dynamic estimates of popularities, for example using moving-average or autoregressive ...This approach requires to tune the filters by ... Voir le document complet

16

In search of an alternative to shareholder value maximization

In search of an alternative to shareholder value maximization

... complementary, and no such compensation is acceptable. 4.4 For a legal recognition of the company Taking into account the stakeholders —-the third way— consists in mak- ing sure, by legal requirements, that ... Voir le document complet

31

A realist approach to studying the Universal Health Coverage Partnership

A realist approach to studying the Universal Health Coverage Partnership

... § A set of explicit & implicit theories § An active and populated intervention § Embedded in several layers of context. § Non-linear and leaky[r] ... Voir le document complet

22

Set Coverage and Robust Policy

Set Coverage and Robust Policy

... Imbens and Manski (2004) pointed out that confidence regions may cover the whole identified set with a prescribed probability, to which we shall refer as set coverage, or they may cover each of its points ... Voir le document complet

6

An axiomatic approach for persuasion dialogs

An axiomatic approach for persuasion dialogs

... dialogs. An impor- tant question is: do argumentation systems for reasoning need to be finite ...system. For a broad class of logics, the set of all arguments that may be built from a knowledge base ... Voir le document complet

10

An Approach for Verifying Concurrent C Programs

An Approach for Verifying Concurrent C Programs

... system and its complexity are fast growing, software correctness becomes more and more a crucial is- ...work-in-progress approach for formally specifying and verifying concurrent C ... Voir le document complet

5

An Alternative Approach for SIDH Arithmetic

An Alternative Approach for SIDH Arithmetic

... Jao and De Feo ...SIKE for Supersingular Isogeny Key encapsulation [12], includes various optimizations from recent works such as [7] and ...cryption and KEMs schemes – as well as very small ... Voir le document complet

19

The source-effort coverage of an exponential informetric process

The source-effort coverage of an exponential informetric process

... Discussion Before working on examples, we must think about the significance of such a result. First of all, we notice that, in the same way as for an IPP, the normalizing factor C doesn’t play a part in ... Voir le document complet

21

An approach for social interest detection

An approach for social interest detection

... fields. For example, fields could be the title, the content, the URL, ...our approach, the indexation process has been made according to the content of the ...in an index file, where each term is ... Voir le document complet

3

Show all 10000 documents...