Sciweavers

2801 search results - page 479 / 561
» On the Adequateness of the Connection Method
Sort
View
JIPS
2007
100views more  JIPS 2007»
14 years 9 months ago
Static Type Assignment for SSA Form in CTOC
: Although the Java bytecode has numerous advantages, it also has certain shortcomings such as its slow execution speed and difficulty of analysis. In order to overcome such disadv...
Ki-Tae Kim, Weon-Hee Yoo
ADHOC
2004
100views more  ADHOC 2004»
14 years 9 months ago
Position and orientation in ad hoc networks
Position and orientation information of individual nodes in ad hoc networks is useful for both service and application implementation. Services that can be enabled by availability...
Dragos Niculescu, Badri Nath
JSAC
2007
139views more  JSAC 2007»
14 years 9 months ago
Reverse-Engineering MAC: A Non-Cooperative Game Model
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Jang-Won Lee, Ao Tang, Jianwei Huang, Mung Chiang,...
JUCS
2007
118views more  JUCS 2007»
14 years 9 months ago
A Model of Immune Gene Expression Programming for Rule Mining
: Rule mining is an important issue in data mining. To address it, a novel Immune Gene Expression Programming (IGEP) model was proposed. Concepts of rule, gene, immune cell, and an...
Tao Zeng, Changjie Tang, Yong Xiang, Peng Chen, Yi...
CCR
2004
116views more  CCR 2004»
14 years 9 months ago
End-to-end congestion control for TCP-friendly flows with variable packet size
Current TCP-friendly congestion control mechanisms adjust the packet rate in order to adapt to network conditions and obtain a throughput not exceeding that of a TCP connection op...
Jörg Widmer, Catherine Boutremans, Jean-Yves ...