Sciweavers

1080 search results - page 169 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
DLOG
2006
14 years 11 months ago
Model checking the basic modalities of CTL with Description Logic
Abstract. Model checking is a fully automated technique for determining whether the behaviour of a finite-state reactive system satisfies a temporal logic specification. Despite th...
Shoham Ben-David, Richard J. Trefler, Grant E. Wed...
76
Voted
ECCV
2006
Springer
15 years 11 months ago
Scene Classification Via pLSA
Given a set of images of scenes containing multiple object categories (e.g. grass, roads, buildings) our objective is to discover these objects in each image in an unsupervised man...
Anna Bosch, Andrew Zisserman, Xavier Muñoz
SIGCOMM
2009
ACM
15 years 4 months ago
In defense of wireless carrier sense
Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. Carrier sense is known ...
Micah Z. Brodsky, Robert T. Morris
97
Voted
VTC
2007
IEEE
15 years 4 months ago
Opportunistic Relay Selection with Limited Feedback
Abstract— It has been shown that a decentralized relay selection protocol based on opportunistic feedback from the relays yields good throughput performance in dense wireless net...
Caleb K. Lo, Robert W. Heath Jr., Sriram Vishwanat...
NGC
2000
Springer
115views Communications» more  NGC 2000»
15 years 1 months ago
Hierarchical reliable multicast
The use of proxies for local error recovery and congestion control is a scalable technique used to overcome a number of wellknown problems in Reliable Multicast (RM). The idea is ...
Athina Markopoulou, Fouad A. Tobagi