نتایج جستجو برای: overhearing

تعداد نتایج: 302  

2013
Charles B. Stone Amanda J. Barnier John Sutton William Hirst

People often talk to others about their personal past. These discussions are inherently selective. Selective retrieval of memories in the course of a conversation may induce forgetting of unmentioned but related memories for both speakers and listeners (Cuc, Koppel, & Hirst, 2007). Cuc et al. (2007) defined the forgetting on the part of the speaker as within-individual retrieval-induced forgett...

Journal: :Eng. Appl. of AI 2013
Yi Chu

Yi Chu Ph.D. Thesis Department of Electronics, University of York 2 Abstract This thesis investigates the application of Reinforcement Learning (RL) on Medium Access Control (MAC) for Wireless Sensor Networks (WSNs). RL is applied as an intelligent slot selection strategy to Framed ALOHA, along with analytical and experimental performance evaluation. Informed Receiving (IR) and ping packets are...

2008
Nikolaus Correll Mac Schwager Daniela Rus

We study social control of a cow herd in which some of the animals are controlled by a sensing and actuation device mounted on the cow. The control is social in that it aims at exploiting the existing gregarious behavior of the animals, rather than controlling each individual directly. As a case study we consider the open-loop control of the herd’s position using location-dependent stimuli. We ...

2014
Jatinder Singh D. B. Johnson D. A. Maltz S. K. Dhurandher

This paper is aimed to detect the malicious behavior of the nodes by first selecting some set of leader nodes. The leader nodes are those set of nodes in a network which monitor the whole network of nodes. The set of leader nodes is referred as the dominating set. A set is dominating if all the nodes of the network are either in the set or neighbors of nodes in the set. The efficiency of a comm...

2010
Stanley Peters

Communicating agents are commonly thought of as intentionally addressing messages to other agents. A growing body of research exists on the interactive case: natural language dialogue. A somewhat different case, also important in many real life social and work settings, is a person overhearing or intentionally listening in on dialogue among a group of other people. Comparatively little research...

2011
Zehua Wang

The multi-hop wireless network has drawn a great deal of attention in the research community. Within the long period after it was proposed, the routing and forwarding operations in the multi-hop wireless network remain to be quite similar to those in the multi-hop wired network or the Internet. However, all the data transmission over the wireless medium in the wireless networks is by broadcasti...

2008
Long H. Vu Klara Nahrstedt Matthias Hollick

In 1969, Thomas Schelling proposed one of the most cited models in economics to explain how similar people (e.g. people with the same race, education, community) group together in American neighborhoods. Interestingly, we observe that the analogies of this model indeed exist in numerous scenarios where co-located people communicate via their personal wireless devices in Peer-to-Peer (P2P) fashi...

2013
Jeffrey Ericson

In 2011, Boston became one of the first cities in the United States to launch a bike-sharing program. Because public transportation by bus and subway can be slow in Boston, and driving even worse at times, bikes were thought to be a good alternative. One of the fun parts about taking public transportation is seeing who will be riding with you. Oftentimes you’ll learn more about some topic just ...

Journal: :Computer Networks 2011
Lei You Lianghui Ding Ping Wu Zhiwen Pan Honglin Hu Mei Song Junde Song

In this paper, we investigate optimal cross-layer design of congestion control, routing, onehop two-way inter-commodity (OTIC) network coding and scheduling in wireless multihop networks utilizing the broadcast advantage of wireless medium. We first present an achievable rate region with OTIC network coding by introducing virtual flow rates in a node. Then we formulate the network utility maxim...

2016
Pouya Ostovari Jie Wu

This survey summarizes the research on the applications and security challenges of network coding in wireless networks and Cyber-Physical Systems. Network coding technique generalizes the store-and-forward routing by mixing the received packets at the intermediate nodes to a single packet before forwarding them. Network coding has received a lot of attention from the community, and researchers ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید