Search
Now showing items 951-960 of 976
A survey of visibility for walkthrough applications
(2003)
Visibility algorithms for walkthrough and related applications have grown into a significant area, spurred by the growth in the complexity of models and the need for highly interactive ways of navigating them. In this ...
Learning optimisation by high firing irregularity
(2012)
In a network of leaky integrate-and-fire (LIF) neurons, we investigate the functional role of irregular spiking at high rates. Irregular spiking is produced by either employing the partial somatic reset mechanism on every ...
Speaker identification for security systems using reinforcement-trained pRAM neural network architectures
(2001)
Four probabilistic pRAM neural network architectures are presented to explain have the different pRAM network architectures perform a classification. In addition, it is shown where the difficulties lie in seperating different ...
Adaptive scheduling over a wireless channel under constrained jamming
(2015)
We consider a wireless channel between a single pair of stations (sender and receiver) that is being “watched” and disrupted by a malicious, adversarial jammer. The sender’s objective is to transmit as much useful data as ...
Algorithmic mechanisms for reliable crowdsourcing computation under collusion
(2015)
We consider a computing system where a master processor assigns a task for execution to worker processors that may collude. We model the workers' decision of whether to comply (compute the task) or not (return a bogus ...
Adaptive packet scheduling over a wireless channel under constrained jamming
(2017)
In this work we consider the communication over a wireless link, between a sender and a receiver, being disrupted by a jammer. The objective of the sender is to transmit as much data as possible to the receiver in the most ...
Packet scheduling over a wireless channel: AQT-based constrained jamming
(2015)
In this paper we consider a two-node setting with a sender transmitting packets to a receiver over a wireless channel. Unfortunately, the channel can be jammed, thus corrupting the packet that is being transmitted at the ...
Online parallel scheduling of non-uniform tasks: Trading failures for energy
(2015)
Consider a system in which tasks of different execution times arrive continuously and have to be executed by a set of machines that are prone to crashes and restarts. In this paper we model and study the impact of parallelism ...