Sciweavers

2912 search results - page 498 / 583
» Overlay Networks - Implementation by Specification
Sort
View
NN
2006
Springer
126views Neural Networks» more  NN 2006»
15 years 4 months ago
Selective attention through phase relationship of excitatory and inhibitory input synchrony in a model cortical neuron
Neurons in area V 2 and V 4 exhibit stimulus specific tuning to single stimuli, and respond at intermediate firing rates when presented with two differentially preferred stimuli (...
Jyoti Mishra, Jean-Marc Fellous, Terrence J. Sejno...
SIGMETRICS
2008
ACM
150views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Performance of random medium access control, an asymptotic approach
Random Medium-Access-Control (MAC) algorithms have played an increasingly important role in the development of wired and wireless Local Area Networks (LANs) and yet the performanc...
Charles Bordenave, David McDonald, Alexandre Prout...
CORR
2010
Springer
184views Education» more  CORR 2010»
15 years 4 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
MTA
2007
113views more  MTA 2007»
15 years 3 months ago
Throughput optimization for video streaming proxy servers based on video staging
A video streaming proxy server needs to handle hundreds of simultaneous connections between media servers and clients. Inside, every video arrived at the server and delivered from ...
Wai Kong Cheuk, Daniel Pak-Kong Lun
ICONFERENCE
2011
14 years 11 months ago
Blogs: spinning a web of virality
The aim of this study is to understand the role of bloggers in driving viral information. More specifically, we develop a new methodology that creates a map of the „life cycleâ€...
Karine Nahon, Jeff Hemsley, Shawn Walker, Muzammil...