Sciweavers

13717 search results - page 2267 / 2744
» Control Systems
Sort
View
151
Voted
MSWIM
2005
ACM
15 years 10 months ago
Adapting WLAN MAC parameters to enhance VoIP call capacity
This work describes a detailed simulation-based study of the performance of an IEEE 802.11e Medium Access Control (MAC) layer over an IEEE 802.11g Physical (PHY) layer. The study ...
Gráinne Hanley, Seán Murphy, Liam Mu...
BERTINORO
2005
Springer
15 years 10 months ago
Design and Analysis of a Bio-inspired Search Algorithm for Peer to Peer Networks
Decentralized peer to peer (p2p) networks like Gnutella are attractive for certain applications because they require no centralized directories and no precise control over network ...
Niloy Ganguly, Lutz Brusch, Andreas Deutsch
CIS
2005
Springer
15 years 10 months ago
Distance Protection of Compensated Transmission Line Using Computational Intelligence
A new approach for protection of transmission line including TCSC is presented in this paper. The proposed method includes application of Fuzzy Neural Network for distance relaying...
S. R. Samantaray, Pradipta K. Dash, Ganapati Panda...
GECCO
2005
Springer
134views Optimization» more  GECCO 2005»
15 years 10 months ago
Tracking extrema in dynamic environments using a coevolutionary agent-based model of genotype edition
Typical applications of evolutionary optimization in static environments involve the approximation of the extrema of functions. For dynamic environments, the interest is not to lo...
Chien-Feng Huang, Luis Mateus Rocha
GECCO
2005
Springer
139views Optimization» more  GECCO 2005»
15 years 10 months ago
Use of a genetic algorithm in brill's transformation-based part-of-speech tagger
The tagging problem in natural language processing is to find a way to label every word in a text as a particular part of speech, e.g., proper noun. An effective way of solving th...
Garnett Carl Wilson, Malcolm I. Heywood
« Prev « First page 2267 / 2744 Last » Next »