Sciweavers

2349 search results - page 158 / 470
» Performing time-sensitive network experiments
Sort
View
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
14 years 11 months ago
On hopeful monsters, neutral networks and junk code in evolving L-systems
This paper investigates L-system evolution through experiments with a simulation platform of virtual plants. The conducted simulations vary the occurrence probability of terminal ...
Stefan Bornhofen, Claude Lattaud
JCP
2008
145views more  JCP 2008»
14 years 10 months ago
An Effective Mining Algorithm for Weighted Association Rules in Communication Networks
The mining of weighted association rules is one of the primary methods used in communication alarm correlation analysis. With large communication alarm database, the traditional me...
Jian Wu, Xing ming Li
82
Voted
ICC
2009
IEEE
145views Communications» more  ICC 2009»
15 years 5 months ago
Buffer Schemes for VBR Video Streaming over Heterogeneous Wireless Networks
—With the co-existence of different wireless networks, which exhibit largely different bandwidth and coverage characteristics, much interest has been involved in integrating thes...
Guang Ji, Ben Liang, Aladdin Saleh
78
Voted
IJCNN
2008
IEEE
15 years 4 months ago
A comparison of architectural varieties in Radial Basis Function Neural Networks
— Representation of knowledge within a neural model is an active field of research involved with the development of alternative structures, training algorithms, learning modes an...
Mehmet Önder Efe, Cosku Kasnakoglu
ADHOC
2007
104views more  ADHOC 2007»
14 years 10 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong