Sciweavers

1080 search results - page 60 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
IPTPS
2005
Springer
15 years 3 months ago
Clustering in P2P Exchanges and Consequences on Performances
— We propose here an analysis of a rich dataset which gives an exhaustive and dynamic view of the exchanges processed in a running eDonkey system. We focus on correlation in term...
Stevens Le-Blond, Jean-Loup Guillaume, Matthieu La...
CN
2007
129views more  CN 2007»
14 years 10 months ago
Performance evaluation of MAC transmission power control in wireless sensor networks
In this paper we provide a method to analytically compute the energy saving provided by the use of transmission power control (TPC) at the MAC layer in wireless sensor networks (W...
Javier Vales-Alonso, Esteban Egea-López, Al...
BMCBI
2010
117views more  BMCBI 2010»
14 years 10 months ago
Using jackknife to assess the quality of gene order phylogenies
Background: In recent years, gene order data has attracted increasing attention from both biologists and computer scientists as a new type of data for phylogenetic analysis. If ge...
Jian Shi, Yiwei Zhang, Haiwei Luo, Jijun Tang
LCN
2006
IEEE
15 years 4 months ago
A Congestion-aware Medium Access Control Protocol for Multi-rate Ad-hoc Networks
This paper investigates the problem of how to improve TCP performance in multi-rate Ad-hoc networks with congested links. To improve network performance, different rate adaptation...
Timo Zauner, Luke Haslett, Wen Hu, Sanjay Jha, Cor...
ETRA
2000
ACM
199views Biometrics» more  ETRA 2000»
15 years 1 months ago
Identifying fixations and saccades in eye-tracking protocols
The process of fixation identification--separating and labeling fixations and saccades in eye-tracking protocols--is an essential part of eye-movement data analysis and can have a...
Dario D. Salvucci, Joseph H. Goldberg