Sciweavers

1010 search results - page 25 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
97
Voted
ADHOCNOW
2004
Springer
15 years 5 months ago
Approximating the Minimum Number of Maximum Power Users in Ad Hoc Networks
Topology control is the problem of assigning transmission power values to the nodes of an ad hoc network so that the induced graph satisfies some specified property. The most fun...
Errol L. Lloyd, Rui Liu, S. S. Ravi
POLICY
2005
Springer
15 years 5 months ago
Adding Policy-Based Control to Mobile Hosts Switching between Streaming Proxies
We add a simple policy-based control component to mobile hosts that enables them to control the continuous reception of live multimedia content (e.g. a TV broadcast) while they sw...
Malohat Ibrohimovna Kamilova, Cristian Hesselman, ...
TMI
2008
92views more  TMI 2008»
14 years 11 months ago
Using Perturbation Theory to Compute the Morphological Similarity of Diffusion Tensors
Computing the morphological similarity of diffusion tensors (DTs) at neighboring voxels within a DT image, or at corresponding locations across different DT images, is a fundamenta...
Ravi Bansal, Lawrence H. Staib, Dongrong Xu, Andre...
IEEEPACT
2008
IEEE
15 years 6 months ago
Multitasking workload scheduling on flexible-core chip multiprocessors
While technology trends have ushered in the age of chip multiprocessors (CMP) and enabled designers to place an increasing number of cores on chip, a fundamental question is what ...
Divya Gulati, Changkyu Kim, Simha Sethumadhavan, S...
RECOMB
2009
Springer
16 years 11 days ago
Evaluating Between-Pathway Models with Expression Data
Abstract. Between-Pathway Models (BPMs) are network motifs consisting of pairs of putative redundant pathways. In this paper, we show how adding another source of high-throughput d...
Benjamin J. Hescott, Mark D. M. Leiserson, Lenore ...