Sciweavers

20197 search results - page 3626 / 4040
» Comparing Computational Power
Sort
View
136
Voted
TWC
2008
87views more  TWC 2008»
15 years 4 months ago
A token-based scheduling scheme for WLANs supporting voice/data traffic and its performance analysis
Most of the existing medium access control (MAC) protocols for wireless local area networks (WLANs) provide prioritized access by adjusting the contention window sizes or interfram...
Ping Wang, Weihua Zhuang
TWC
2008
150views more  TWC 2008»
15 years 4 months ago
Design and analysis of post-coded OFDM systems
This paper discusses the design and analysis of post coded OFDM (PC-OFDM) systems. Coded or precoded OFDM systems are generally employed to overcome the symbol recovery problem in...
S. F. A. Shah, Ahmed H. Tewfik
CCE
2004
15 years 4 months ago
An algorithmic framework for improving heuristic solutions: Part II. A new version of the stochastic traveling salesman problem
The algorithmic framework developed for improving heuristic solutions of the new version of deterministic TSP [Choi et al., 2002] is extended to the stochastic case. To verify the...
Jaein Choi, Jay H. Lee, Matthew J. Realff
COGSCI
2004
92views more  COGSCI 2004»
15 years 4 months ago
Varieties of crossing dependencies: structure dependence and mild context sensitivity
Four different kinds of grammars that can define crossing dependencies in human language are compared here: (i) context sensitive rewrite grammars with rules that depend on contex...
Edward P. Stabler Jr.
132
Voted
COR
2004
111views more  COR 2004»
15 years 4 months ago
Multiple multicast tree allocation in IP network
The multicasting is defined as the distribution of the same information stream from one to many nodes concurrently. There has been an intensive research effort to design protocols...
Chae Y. Lee, Hee K. Cho
« Prev « First page 3626 / 4040 Last » Next »