Sciweavers

1419 search results - page 280 / 284
» Network Growth with Feedback
Sort
View
JCM
2010
119views more  JCM 2010»
14 years 8 months ago
Evaluation of Router Implementations for Explicit Congestion Control Schemes
— Explicit congestion control schemes use router feedback to overcome limitations of the standard mechanisms of the Transmission Control Protocol (TCP). These approaches require ...
Simon Hauger, Michael Scharf, Jochen Kögel, C...
TON
2010
157views more  TON 2010»
14 years 4 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle
OIR
2011
401views Neural Networks» more  OIR 2011»
14 years 28 days ago
Using Online Collaborative Tools for Groups to Co-Construct Knowledge
(limit 250 words) Purpose This paper reports and describes the use of MediaWiki and Google Docs at undergraduate level as online collaboration tools for co-constructing knowledge i...
Sam Kai Wah Chu, David M. Kennedy
ICFP
2009
ACM
15 years 10 months ago
Safe functional reactive programming through dependent types
Functional Reactive Programming (FRP) is an approach to reactive programming where systems are structured as networks of functions operating on signals. FRP is based on the synchr...
Neil Sculthorpe, Henrik Nilsson
WISE
2009
Springer
15 years 7 months ago
Start Trusting Strangers? Bootstrapping and Prediction of Trust
Web-based environments typically span interactions between humans and software services. The management and automatic calculation of trust are among the key challenges of the futur...
Florian Skopik, Daniel Schall, Schahram Dustdar