Sciweavers

3758 search results - page 614 / 752
» A Complete Subsumption Algorithm
Sort
View
JNW
2008
101views more  JNW 2008»
14 years 10 months ago
Computational Time-Division and Code-Division Channel Access Scheduling in Ad Hoc Networks
Using two-hop neighborhood information, we present the hybrid activation multiple access (HAMA) protocol for time-division channel access scheduling in ad hoc networks with omni-di...
Lichun Bao, J. J. Garcia-Luna-Aceves
JSAC
2008
118views more  JSAC 2008»
14 years 10 months ago
Auction-Based Resource Allocation for Cooperative Communications
Abstract--Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper...
Jianwei Huang, Zhu Han, Mung Chiang, H. Vincent Po...
JPDC
2006
93views more  JPDC 2006»
14 years 10 months ago
Fault-tolerant multicasting in hypercubes using local safety information
A fully unsafe hypercube according to the global safety can be split into a unique set of maximal safe subcubes. Multicasting in a maximal safe subcube can be completed reliably b...
Dong Xiang, Ai Chen, Jia-Guang Sun
NC
2008
120views Neural Networks» more  NC 2008»
14 years 10 months ago
Combining self-healing and proofreading in self-assembly
Molecular self-assembly is a promising approach to bottom-up fabrication of complex structures. A major impediment to the practical use of self-assembly to create complex structure...
David Soloveichik, Matthew Cook, Erik Winfree
MP
2006
119views more  MP 2006»
14 years 10 months ago
Approximate extended formulations
Mixed integer programming (MIP) formulations are typically tightened through the use of a separation algorithm and the addition of violated cuts. Using extended formulations involv...
Mathieu Van Vyve, Laurence A. Wolsey