Sciweavers

428 search results - page 69 / 86
» An asynchronous complete method for distributed constraint o...
Sort
View
DCC
2001
IEEE
15 years 11 months ago
A Posteriori Quantized Matching Pursuit
This paper studies quantization error in the context of Matching Pursuit coded streams and proposes a new coefficient quantization scheme taking benefit of the Matching Pursuit pr...
Pascal Frossard, Pierre Vandergheynst
CISS
2008
IEEE
15 years 6 months ago
A linear integer programming approach to analyze P2P media streaming
Recent advancement in peer-to-peer (P2P) technologies has enabled a wide range of new applications. In this paper, we present mixed integer programming (MIP) formulations to analy...
Fulu Li, Jianwei Huang, Andrew Lippman
INFOCOM
2010
IEEE
14 years 10 months ago
Capacity Region of a Wireless Mesh Backhaul Network over the CSMA/CA MAC
—This paper studies the maximum throughput that can be supported by a given wireless mesh backhaul network, over a practical CSMA/CA medium access control (MAC) protocol. We reso...
Yu Cheng, Hongkun Li, Peng-Jun Wan, Xinbing Wang
ATAL
2003
Springer
15 years 5 months ago
Risk-averse auction agents
Auctions are an important means for purchasing material in the era of e-commerce. Research on auctions often studies them in isolation. In practice, however, auction agents are pa...
Yaxin Liu, Richard Goodwin, Sven Koenig
BMCBI
2006
133views more  BMCBI 2006»
14 years 11 months ago
Choosing negative examples for the prediction of protein-protein interactions
The protein-protein interaction networks of even well-studied model organisms are sketchy at best, highlighting the continued need for computational methods to help direct experim...
Asa Ben-Hur, William Stafford Noble