Sciweavers

12131 search results - page 2230 / 2427
» Introduction to Modeling and Simulation
Sort
View
CJ
2010
87views more  CJ 2010»
15 years 2 months ago
Resource-Aware Multimedia Content Delivery: A Gambling Approach
In this paper, we propose a resource-aware solution to achieving reliable and scalable stream diffusion in a probabilistic model, i.e., where communication links and processes are...
Mouna Allani, Benoît Garbinato, Fernando Ped...
168
Voted
CORR
2010
Springer
175views Education» more  CORR 2010»
15 years 2 months ago
Efficient Packet Forwarding Approach in Vehicular Ad Hoc Networks Using EBGR Algorithm
VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing ...
K. Prasanth, K. Duraiswamy, K. Jayasudha, C. Chand...
173
Voted
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 2 months ago
A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks
The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques that plays influential role in ensuring the desired Quality of Service (QoS) to the users...
H. S. Ramesh Babu, Gowrishankar, P. S. Satyanaraya...
155
Voted
ACL
2010
15 years 1 months ago
Learning to Adapt to Unknown Users: Referring Expression Generation in Spoken Dialogue Systems
We present a data-driven approach to learn user-adaptive referring expression generation (REG) policies for spoken dialogue systems. Referring expressions can be difficult to unde...
Srinivasan Janarthanam, Oliver Lemon
128
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Spam mitigation using spatio-temporal reputations from blacklist history
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to...
Andrew G. West, Adam J. Aviv, Jian Chang, Insup Le...
« Prev « First page 2230 / 2427 Last » Next »