Sciweavers

123 search results - page 7 / 25
» Multiple Identities in BitTorrent Networks
Sort
View
IJCNN
2007
IEEE
15 years 4 months ago
A Closed Form Solution for Multiple-Input Spike Based Adaptive Filters
— Neurons are point process systems, in the sense that the inputs and output which are spike trains can be treated as point processes. System identification of a point process s...
Il Park, António R. C. Paiva, Jose C. Princ...
INFOCOM
1993
IEEE
15 years 1 months ago
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Multiple Node Case
Worst-casebounds on delay and backlog are derived for leaky bucket constrained sessions in arbitrary topology networks of Generalized Processor Sharing (GPS) 10] servers. The inhe...
Abhay K. Parekh, Robert G. Gallager
DIALM
2004
ACM
161views Algorithms» more  DIALM 2004»
15 years 1 months ago
Batch conflict resolution algorithm with progressively accurate multiplicity estimation
The wireless connectivity, essential for pervasive computing, has ephemeral character and can be used for creating ad hoc networks, sensor networks, connection with RFID tags etc....
Petar Popovski, Frank H. P. Fitzek, Ramjee Prasad
73
Voted
CEC
2005
IEEE
15 years 3 months ago
Clustering-based approach to identify solutions for the inference of regulatory networks
Abstract- In this paper we address the problem of finding valid solutions for the problem of inferring gene regulatory networks. Different approaches to directly infer the depende...
Christian Spieth, Felix Streichert, Nora Speer, An...
BROADNETS
2007
IEEE
15 years 4 months ago
Monitoring and alarm management in transparent optical networks
—Rapid fault identification and localization in optical networks are crucial due to high data rates. These problems are more challenging than in traditional electronic networks ...
Sava Stanic, Gokhan Sahin, Hongsik Choi, Suresh Su...