Sciweavers

1080 search results - page 181 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
IAJIT
2007
150views more  IAJIT 2007»
14 years 9 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
PRL
2006
180views more  PRL 2006»
14 years 9 months ago
MutualBoost learning for selecting Gabor features for face recognition
This paper describes an improved boosting algorithm, the MutualBoost algorithm, and its application in developing a fast and robust Gabor feature based face recognition system. Th...
LinLin Shen, Li Bai
SAC
2008
ACM
14 years 9 months ago
Privacy-preserving link discovery
Abstract. Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interac...
Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R....
INFOCOM
2010
IEEE
14 years 8 months ago
Recognizing Exponential Inter-Contact Time in VANETs
—Inter-contact time between moving vehicles is one of the key metrics in vehicular ad hoc networks (VANETs) and central to forwarding algorithms and the end-to-end delay. Due to ...
Hongzi Zhu, Luoyi Fu, Guangtao Xue, Yanmin Zhu, Mi...
ASMTA
2010
Springer
192views Mathematics» more  ASMTA 2010»
14 years 7 months ago
Packet Loss Minimization in Load-Balancing Switch
Due to the overall growing demand on the network resources and tight restrictions on the power consumption, the requirements to the long-term scalability, cost and performance capa...
Yury Audzevich, Levente Bodrog, Yoram Ofek, Mikl&o...