Sciweavers

20813 search results - page 164 / 4163
» Introduction to Computer Networking
Sort
View
125
Voted
CIS
2005
Springer
15 years 7 months ago
Distance Protection of Compensated Transmission Line Using Computational Intelligence
A new approach for protection of transmission line including TCSC is presented in this paper. The proposed method includes application of Fuzzy Neural Network for distance relaying...
S. R. Samantaray, Pradipta K. Dash, Ganapati Panda...
CJ
2004
99views more  CJ 2004»
15 years 2 months ago
Filters for XML-based Service Discovery in Pervasive Computing
Pervasive computing refers to an emerging trend towards numerous casually accessible devices connected to an increasingly ubiquitous network infrastructure. An important challenge...
Georgia Koloniari, Evaggelia Pitoura
ASC
2011
14 years 9 months ago
Quality of Service constrained routing optimization using Evolutionary Computation
In this work, a novel optimization framework is proposed that allows the improvement of Quality of Service levels in TCP/IP based networks, by configuring the routing weights of ...
Miguel Rocha, Pedro Sousa, Paulo Cortez, Miguel Ri...
SIGCOMM
1994
ACM
15 years 6 months ago
Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers
An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. In this paper we present an inno...
Charles E. Perkins, Pravin Bhagwat
ICSE
2007
IEEE-ACM
15 years 8 months ago
ACL2s: "The ACL2 Sedan"
ACL2 is the latest inception of the Boyer-Moore theorem prover, the 2005 recipient of the ACM Software System Award. In the hands of an expert, it feels like a finely tuned race ...
Peter C. Dillinger, Panagiotis Manolios, Daron Vro...