Sciweavers

4072 search results - page 433 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
143
Voted
CIARP
2009
Springer
15 years 11 months ago
Analysis of the GRNs Inference by Using Tsallis Entropy and a Feature Selection Approach
Abstract. An important problem in the bioinformatics field is to understand how genes are regulated and interact through gene networks. This knowledge can be helpful for many appl...
Fabrício Martins Lopes, Evaldo A. de Olivei...
IPSN
2011
Springer
14 years 8 months ago
Localising speech, footsteps and other sounds using resource-constrained devices
While a number of acoustic localisation systems have been proposed over the last few decades, these have typically either relied on expensive dedicated microphone arrays and works...
Yukang Guo, Mike Hazas
SIGCOMM
2009
ACM
15 years 11 months ago
Why should we integrate services, servers, and networking in a data center?
Since the early days of networks, a basic principle has been that endpoints treat the network as a black box. An endpoint injects a packet with a destination address and the netwo...
Paolo Costa, Thomas Zahn, Antony I. T. Rowstron, G...
SENSYS
2004
ACM
15 years 10 months ago
Versatile low power media access for wireless sensor networks
We propose B-MAC, a carrier sense media access protocol for wireless sensor networks that provides a flexible interface to obtain ultra low power operation, effective collision a...
Joseph Polastre, Jason L. Hill, David E. Culler
INFOCOM
2002
IEEE
15 years 9 months ago
Restoration Algorithms for Virtual Private Networks in the Hose Model
—A Virtual Private Network (VPN) aims to emulate the services provided by a private network over the shared Internet. The endpoints of e connected using abstractions such as Virt...
Giuseppe F. Italiano, Rajeev Rastogi, Bülent ...