Sciweavers

2076 search results - page 40 / 416
» Kauffman networks: analysis and applications
Sort
View
CONEXT
2005
ACM
15 years 2 months ago
Root cause analysis for long-lived TCP connections
While the applications using the Internet have changed over time, TCP is still the dominating transport protocol that carries over 90% of the total traffic. Throughput is the key...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
91
Voted
AINA
2007
IEEE
15 years 4 months ago
Uniformity and Efficiency of a Wireless Sensor Network's Coverage
Abstract-- The primary contribution of this paper is in a wireless sensor network's coverage analysis method, which focuses on both the coverage itself and its uniformity and ...
Md. Ashiqur Rahman, Sajid Hussain
DSOM
2003
Springer
15 years 5 months ago
A Method on Multimedia Service Traffic Monitoring and Analysis
The use of multimedia service applications is growing rapidly on the Internet. These applications are generating a huge volume of network traffic, which has a great impact on netw...
Hun-Jeong Kang, Myung-Sup Kim, James Won-Ki Hong
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
14 years 3 months ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...
92
Voted
IDEAL
2004
Springer
15 years 6 months ago
Exploiting Safety Constraints in Fuzzy Self-organising Maps for Safety Critical Applications
This paper defines a constrained Artificial Neural Network (ANN) that can be employed for highly-dependable roles in safety critical applications. The derived model is based upon t...
Zeshan Kurd, Tim P. Kelly, Jim Austin