Sciweavers

82 search results - page 14 / 17
» Entrainment Competition in Complex Networks
Sort
View
112
Voted
ECCC
2000
158views more  ECCC 2000»
15 years 15 days ago
On the Computational Power of Winner-Take-All
This article initiates a rigorous theoretical analysis of the computational power of circuits that employ modules for computing winner-take-all. Computational models that involve ...
Wolfgang Maass
167
Voted
WSC
2001
15 years 2 months ago
Distributed simulation with incorporated APS procedures for high-fidelity supply chain optimization
Tactical and operational planning for manufacturing enterprises are more important today than ever before as their supply chains span the globe. Two state-of-the-art technologies ...
Peter Lendermann, Boon-Ping Gan, Leon F. McGinnis
93
Voted
ICCCN
2008
IEEE
15 years 7 months ago
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols
—Most existing wireless ad hoc routing protocols rely upon the use of backward learning technique with explicit control messages to route packets. In this paper we propose a set ...
Navodaya Garepalli, Kartik Gopalan, Ping Yang
96
Voted
EMSOFT
2004
Springer
15 years 6 months ago
Reuse of software in distributed embedded automotive systems
Until recently, in the automotive industry, reuse of software has entirely been a typical activity of suppliers. They try to reduce the increasing software development costs that ...
Bernd Hardung, Thorsten Kölzow, Andreas Kr&uu...
109
Voted
ISCAS
2008
IEEE
110views Hardware» more  ISCAS 2008»
15 years 7 months ago
Non-traditional irregular interconnects for massive scale SoC
— By using self-assembling fabrication techniques at the cellular, molecular, or atomic scale, it is nowadays possible to create functional assemblies in a mainly bottom-up way t...
Christof Teuscher, Anders A. Hansson