Sciweavers

2200 search results - page 223 / 440
» Hop Integrity in Computer Networks
Sort
View
CDC
2008
IEEE
15 years 10 months ago
Robust invariant set theory applied to networked buffer-level control
— A manufacturer producing several items keeps them into safety stocks (buffers) in order to supply an external stochastic demand without interruptions. We consider the classical...
Francesco Borrelli, Carmen Del Vecchio, Alessandra...
WIMOB
2008
IEEE
15 years 10 months ago
PGMS: Pseudo-optimal Greedy Media Streaming Algorithm for Heterogeneous Wireless Networks
The integration of different wireless access technologies combined with the huge characteristic diversity of supported services in next-generation systems creates a real heterogen...
Ahmed H. Zahran, Cormac J. Sreenan
P2P
2005
IEEE
15 years 9 months ago
ARA: A Robust Audit to Prevent Free-Riding in P2P Networks
A number of solutions have been proposed to address the free-riding problem in peer-to-peer file sharing systems. The solutions are either imperfect–they allow some users to ch...
MyungJoo Ham, Gul Agha
IJON
2000
61views more  IJON 2000»
15 years 3 months ago
Encoding multiple orientations in a recurrent network
Models containing recurrent connections amongst the cells within a population can account for a range of empirical data on orientation selectivity in striate cortex. However, exis...
Richard S. Zemel, Jonathan Pillow
SBCCI
2005
ACM
114views VLSI» more  SBCCI 2005»
15 years 9 months ago
Traffic generation and performance evaluation for mesh-based NoCs
The designer of a system on a chip (SoC) that connects IP cores through a network on chip (NoC) needs methods to support application performance evaluation. Two key aspects these ...
Leonel Tedesco, Aline Mello, Diego Garibotti, Ney ...