نتایج جستجو برای: centralized simulated

تعداد نتایج: 151342  

2004
GOLHA SHARIFI RALPH DETERS JULITA VASSILEVA

The paper describes a case study of how a combination of techniques, such as agent technologies, user, task and context modeling can be used to adapt a distributed application for mobile users with Personal Digital Assistants (PDAs) and support seamless connection and access to a centralized information system in areas of disconnection. In a domain where users have typical tasks and information...

2016
Shaolun Xu Liang Zhang Zheng Yan Donghan Feng Gang Wang Xiaobo Zhao

Uncoordinated charging of large-scale electric vehicles (EVs) will have a negative impact on the secure and economic operation of the power system, especially at the distribution level. Given that the charging load of EVs can be controlled to some extent, research on the optimal charging control of EVs has been extensively carried out. In this paper, two possible smart charging scenarios in Chi...

2008
Mário Macedo Mário Serafim Nunes António Grilo

Energy-efficiency and latency requirements in alarm-driven Wireless Sensor Networks often demand the use of TDMA protocols with special features such as cascading of timeslots, in a way that the sensor-to-sink delay bound can stay below a single frame. However, this single TDMA frame should be as small as possible. This paper presents a comparative study of timeslot allocation strategies that c...

2017
Hang Ma Jiaoyang Li T. K. Satish Kumar Sven Koenig

The multi-agent path-finding (MAPF) problem has recently received a lot of attention. However, it does not capture important characteristics of many real-world domains, such as automated warehouses, where agents are constantly engaged with new tasks. In this paper, we therefore study a lifelong version of the MAPF problem, called the multiagent pickup and delivery (MAPD) problem. In the MAPD pr...

Journal: :CoRR 2014
Liang Zhang Zheng Yan Donghan Feng Gang Wang Shaolun Xu Naihu Li Lei Jing

Uncoordinated charging of large-scale electric vehicles (EVs) will have a negative impact on the secure and economic operation of the power system, especially at the distribution level. Given that the charging load of EVs can be controlled to some extent, research on the optimal charging control of EVs has been extensively carried out. In this paper, two possible smart charging scenarios in Chi...

2010
Sarah E. Webster Louis L. Whitcomb Ryan M. Eustice

We report a decentralized, vehicle-based extended information filter designed to enable single-beacon acoustic navigation of multiple underwater vehicles. In single-beacon navigation, ranges from a single reference beacon to a moving underwater vehicle are used in addition to the vehicle’s inertial navigation sensors to perform absolute (as opposed to relative) localization and navigation. For ...

2015
Stephanie Frost Gordon I. McCalla

Instructional planning (IP) technology has begun to reach large online environments. However, many approaches rely on having centralized metadata structures about the learning objects (LOs). For dynamic open-ended learning environments (DOELEs), an approach is needed that does not rely on centralized structures such as prerequisite graphs that would need to be continually rewired as the LOs cha...

2011
G. Muneeswari A. Sobitha Ahila K. L. Shunmuganathan

In a Multicore architecture, each package consists of large number of processors. This increase in processor core brings new evolution in parallel computing. Besides enormous performance enhancement, this multicore package injects lot of challenges and opportunities on the operating system scheduling point of view. We know that multiagent system is concerned with the development and analysis of...

2008
Michael Sirivianos Xiaowei Yang Kyungbaek Kim

Unwanted traffic mitigation can be broadly classified into two main approaches: a) centralized security infrastructures that rely on a limited number of trusted monitors to detect and report malicious traffic; and b) highly distributed systems that leverage the experiences of multiple nodes within distinct trust domains. The first approach offers limited threat coverage and slow response times....

Journal: :CoRR 2009
Michael Sirivianos Xiaowei Yang Kyungbaek Kim

Spam mitigation can be broadly classified into two main approaches: a) centralized security infrastructures that rely on a limited number of trusted monitors to detect and report malicious traffic; and b) highly distributed systems that leverage the experiences of multiple nodes within distinct trust domains. The first approach offers limited threat coverage and slow response times, and it is o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید