Sciweavers

1816 search results - page 283 / 364
» Case study in modeling and simulation validation methodology
Sort
View
CSE
2009
IEEE
15 years 4 months ago
How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and virus spreading. A family of algorithms, generally known as ...
Manuel Cebrián, Enrique Frías-Mart&i...
ICRA
2008
IEEE
157views Robotics» more  ICRA 2008»
15 years 4 months ago
Analysis and improvement of the consistency of extended Kalman filter based SLAM
Abstract— In this work, we study the inconsistency of EKFbased SLAM from the perspective of observability. We analytically prove that when the Jacobians of the state and measurem...
Guoquan Huang, Anastasios I. Mourikis, Stergios I....
CORR
2007
Springer
138views Education» more  CORR 2007»
14 years 9 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
GLOBECOM
2007
IEEE
15 years 4 months ago
Spatial Outage Probability for Cellular Networks
— In this paper, we propose a new framework for the study of cellular networks called the fluid model and we derive from this model analytical formulas for interference, outage ...
Jean Marc Kelif, Marceau Coupechoux, Philippe Godl...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 4 months ago
Availability-Constrained Shared Backup Path Protection (SBPP) for GMPLS-Based Spare Capacity Reprovisioning
– Shared-backup path protection (SBPP) has been widely studied in the GMPLS networks due to its efficient spare capacity sharing and flexibility in service provisioning. This pap...
Qi Guo, Pin-Han Ho, Anwar Haque, Hussein T. Moufta...