Sciweavers

1320 search results - page 84 / 264
» Constraint Based Network Adaptation for Ubiquitous Applicati...
Sort
View
131
Voted
EMMCVPR
2003
Springer
15 years 6 months ago
Asymptotic Characterization of Log-Likelihood Maximization Based Algorithms and Applications
The asymptotic distribution of estimates that are based on a sub-optimal search for the maximum of the log-likelihood function is considered. In particular, estimation schemes that...
Doron Blatt, Alfred O. Hero
99
Voted
DSOM
2006
Springer
15 years 4 months ago
Conflict Prevention Via Model-Driven Policy Refinement
This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. Central to the approach is an algori...
Steven Davy, Brendan Jennings, John Strassner
BMCBI
2010
178views more  BMCBI 2010»
15 years 24 days ago
Applications of a formal approach to decipher discrete genetic networks
Background: A growing demand for tools to assist the building and analysis of biological networks exists in systems biology. We argue that the use of a formal approach is relevant...
Fabien Corblin, Eric Fanchon, Laurent Trilling
129
Voted
MMNS
2003
130views Multimedia» more  MMNS 2003»
15 years 2 months ago
TCP Friendly Rate Adaptation for Multimedia Streaming in Mobile ad hoc Networks
Transport protocol for supporting multimedia streaming in mobile ad hoc networks has to cope with the rich dynamics, including mobility-induced disconnection, reconnection, and hig...
Zhenghua Fu, Xiaoqiao Meng, Songwu Lu
GCC
2005
Springer
15 years 6 months ago
A Topology Adaptation Protocol for Structured Superpeer Overlay Construction
Peer-to-peer networks can be divided into structured and unstructured based on their overlay topologies. In reality, unstructured p2p networks with superpeers have proved their cap...
Changyong Niu, Jian Wang, Ruimin Shen