Sciweavers

7504 search results - page 1264 / 1501
» Computing with Action Potentials
Sort
View
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 4 months ago
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarc...
Bryan Ford
128
Voted
CSDA
2006
122views more  CSDA 2006»
15 years 4 months ago
The fuzzy approach to statistical analysis
For the last decades, research studies have been developed in which a coalition of Fuzzy Sets Theory and Statistics has been established with different purposes. These namely are:...
Renato Coppi, María Angeles Gil, Henk A. L....
IJMMS
2008
90views more  IJMMS 2008»
15 years 4 months ago
Pair programming and the mysterious role of the navigator
Computer programming is generally understood to be highly challenging and since its inception a wide range of approaches, tools and methodologies have been developed to assist in ...
Sallyann Bryant, Pablo Romero, Benedict du Boulay
110
Voted
CCR
2007
76views more  CCR 2007»
15 years 4 months ago
Reducing the TCP acknowledgment frequency
Delayed acknowledgments were introduced to conserve network and host resources. Further reduction of the acknowledgment frequency can be motivated in the same way. However, reduci...
Sara Landström, Lars-Åke Larzon
IGPL
2006
115views more  IGPL 2006»
15 years 4 months ago
Towards Operational Abduction from a Cognitive Perspective
Diminishing awareness is a consequence of the information explosion: disciplines are becoming increasingly specialized; individuals and groups are becoming ever more insular. This...
Peter Bruza, Richard Cole, Dawei Song, Zeeniya Bar...
« Prev « First page 1264 / 1501 Last » Next »