Sciweavers

11862 search results - page 2122 / 2373
» Relative information completeness
Sort
View
JCP
2008
206views more  JCP 2008»
15 years 4 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
INFSOF
2006
102views more  INFSOF 2006»
15 years 4 months ago
Comparison of software architecture reverse engineering methods
Problems related to interactions between components is a sign of problems with the software architecture of the system and are often costly to fix. Thus it is very desirable to id...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...
JAIR
2006
74views more  JAIR 2006»
15 years 4 months ago
Understanding Algorithm Performance on an Oversubscribed Scheduling Application
The best performing algorithms for a particular oversubscribed scheduling application, Air Force Satellite Control Network (AFSCN) scheduling, appear to have little in common. Yet...
Laura Barbulescu, Adele E. Howe, L. Darrell Whitle...
JNW
2008
124views more  JNW 2008»
15 years 4 months ago
A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks
Position based routing algorithms use the knowledge of the position of nodes for routing of packets in mobile ad-hoc networks. Previously proposed position based routing algorithms...
Shahab Kamali, Jaroslav Opatrny
CSL
2007
Springer
15 years 4 months ago
Modeling durations of syllables using neural networks
In this paper, we propose a neural network model for predicting the durations of syllables. A four layer feedforward neural network trained with backpropagation algorithm is used ...
K. Sreenivasa Rao, B. Yegnanarayana
« Prev « First page 2122 / 2373 Last » Next »