Sciweavers

2555 search results - page 199 / 511
» Quantifiers and Working Memory
Sort
View
ICC
2009
IEEE
170views Communications» more  ICC 2009»
15 years 10 months ago
Transmission Capacity of Two-Way Communication in Wireless Ad Hoc Networks
—Wireless ad hoc networks require bidirectional data transmission to support two-way traffic and control functions like packet acknowledgement. Most prior work on the capacity o...
Kien T. Truong, Steven Weber, Robert W. Heath Jr.
140
Voted
ICPPW
2009
IEEE
15 years 10 months ago
Just-in-Time Renaming and Lazy Write-Back on the Cell/B.E.
— Cell Superscalar (CellSs) provides a simple, flexible and easy programming approach for the Cell Broadband Engine (Cell/B.E.) that automatically exploits the inherent concurre...
Pieter Bellens, Josep M. Pérez, Rosa M. Bad...
119
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Tuning Skype's Redundancy Control Algorithm for User Satisfaction
—Determining how to transport delay-sensitive voice data has long been a problem in multimedia networking. The difficulty arises because voice and best-effort data are different...
Te-Yuan Huang, Kuan-Ta Chen, Polly Huang
145
Voted
BICOB
2009
Springer
15 years 10 months ago
A Fitness Distance Correlation Measure for Evolutionary Trees
Phylogenetics is concerned with inferring the genealogical relationships between a group of organisms (or taxa), and this relationship is usually expressed as an evolutionary tree....
Hyun Jung Park, Tiffani L. Williams
COMPSAC
2008
IEEE
15 years 10 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...