Sciweavers

2283 search results - page 372 / 457
» Bounds of Graph Characteristics
Sort
View
INFOCOM
2002
IEEE
15 years 2 months ago
Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement
IEEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the I...
Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, ...
CDC
2009
IEEE
225views Control Systems» more  CDC 2009»
15 years 2 months ago
High performance adaptive robust control for nonlinear system with unknown input backlash
—A high performance adaptive robust control (ARC) algorithm is developed for a class of nonlinear system with unknown input backlash, parametric uncertainties and uncertain nonli...
Jian Guo, Bin Yao, Qingwei Chen, Xiaobei Wu
GECCO
2009
Springer
110views Optimization» more  GECCO 2009»
15 years 2 months ago
EMO shines a light on the holes of complexity space
Typical domains used in machine learning analyses only partially cover the complexity space, remaining a large proportion of problem difficulties that are not tested. Since the ac...
Núria Macià, Albert Orriols-Puig, Es...
CSFW
1999
IEEE
15 years 2 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
ICDCS
1997
IEEE
15 years 2 months ago
Distributed Recovery with K-Optimistic Logging
Fault-tolerance techniques based on checkpointing and message logging have been increasingly used in real-world applications to reduce service down-time. Most industrial applicati...
Yi-Min Wang, Om P. Damani, Vijay K. Garg