Sciweavers

2912 search results - page 229 / 583
» Overlay Networks - Implementation by Specification
Sort
View
ISNN
2010
Springer
15 years 8 months ago
Applications of Second Order Blind Identification to High-Density EEG-Based Brain Imaging: A Review
In the context of relating specific brain functions to specific brain structures, second-order blind identification (SOBI) is one of the blind source separation algorithms that hav...
Akaysha Tang
FLAIRS
2004
15 years 5 months ago
Mining Bayesian Networks to Forecast Adverse Outcomes Related to Acute Coronary Syndrome
One fascinating aspect of tool building for datamining is the application of a generalized datamining tool to a specific domain. Often times, this process results in a cross disci...
Andy Novobilski, Francis M. Fesmire, David Sonnema...
JSAC
2008
110views more  JSAC 2008»
15 years 3 months ago
Designing Multicast Protocols for Non-Cooperative Networks
Conventionally, most network protocols assume that the network entities who participate in the network activities will always behave as instructed. However, in practice, most netwo...
Weizhao Wang, Xiang-Yang Li, Yu Wang 0003, Zheng S...
COMPSAC
2004
IEEE
15 years 7 months ago
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
Web services (WS) received significant attention recently because services can be searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic reconfi...
Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin...
BROADNETS
2007
IEEE
15 years 10 months ago
Computer worm ecology in encounter-based networks
Abstract— Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information dissemina...
Sapon Tanachaiwiwat, Ahmed Helmy