Sciweavers

9719 search results - page 1705 / 1944
» Inference for Multiplicative Models
Sort
View
INFOCOM
2005
IEEE
15 years 9 months ago
On achieving optimal throughput with network coding
— With the constraints of network topologies and link capacities, achieving the optimal end-to-end throughput in data networks has been known as a fundamental but computationally...
Zongpeng Li, Baochun Li, Dan Jiang, Lap Chi Lau
INFOCOM
2005
IEEE
15 years 9 months ago
Non-pipelined relay improves throughput performance of wireless ad-hoc networks
—The communication model typically assumed in wireless ad-hoc networks is based on a traditional “pipelined relay” (PR) strategy. In PR, an end-to-end flow has multiple outs...
Aravind Velayutham, Karthikeyan Sundaresan, Raghup...
IPPS
2005
IEEE
15 years 9 months ago
Optimal Channel Assignments for Lattices with Conditions at Distance Two
The problem of radio channel assignments with multiple levels of interference can be modeled using graph theory. Given a graph G, possibly infinite, and real numbers k1, k2, . . ...
Jerrold R. Griggs, Xiaohua Teresa Jin
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
15 years 9 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
ISPDC
2005
IEEE
15 years 9 months ago
A Component-based Software Infrastructure for Ubiquitous Computing
Multiplication of mobile devices and generalized use of wireless networks imply changes on the design and execution of distributed software applications targeting ubiquitous compu...
Areski Flissi, Christophe Gransart, Philippe Merle
« Prev « First page 1705 / 1944 Last » Next »