Sciweavers

2357 search results - page 304 / 472
» Computing Refactorings of Behavior Models
Sort
View
AINA
2009
IEEE
15 years 5 months ago
Adaptive and Online One-Class Support Vector Machine-Based Outlier Detection Techniques for Wireless Sensor Networks
Outlier detection in wireless sensor networks is essential to ensure data quality, secure monitoring and reliable detection of interesting and critical events. A key challenge for...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga
208
Voted
AB
2008
Springer
15 years 5 months ago
The Geometry of the Neighbor-Joining Algorithm for Small Trees
In 2007, Eickmeyer et al. showed that the tree topologies outputted by the Neighbor-Joining (NJ) algorithm and the balanced minimum evolution (BME) method for phylogenetic reconstr...
Kord Eickmeyer, Ruriko Yoshida
BROADNETS
2005
IEEE
15 years 5 months ago
Opportunistic power allocation for fading channels with non-cooperative users and random access
— We present a game-theoretical model of a wireless communication system with multiple competing users sharing a multiaccess fading channel. With a specified capture rule and a ...
Jun Sun 0007, Eytan Modiano
CONCUR
2005
Springer
15 years 5 months ago
The Coarsest Congruence for Timed Automata with Deadlines Contained in Bisimulation
Abstract. Delaying the synchronization of actions may reveal some hidden behavior that would not happen if the synchronization met the specified deadlines. This precise phenomenon...
Pedro R. D'Argenio, Biniam Gebremichael
HPCNCS
2007
15 years 4 months ago
Time-Adaptive Numerical Simulation for High Speed Networks
Abstract—As the bandwidth of networks is increasing exponentially, the computational cost to simulate such type of networks is also growing in a similar fashion. This paper prese...
Suman Kumar, Seung-Jong Park, S. Sitharama Iyengar...