Sciweavers

5358 search results - page 859 / 1072
» Script-based Presentation of Simulation Results
Sort
View
PKDD
2010
Springer
150views Data Mining» more  PKDD 2010»
15 years 3 months ago
Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms
Given a contact network that changes over time (say, day vs night connectivity), and the SIS (susceptible/infected/susceptible, flu like) virus propagation model, what can we say ...
B. Aditya Prakash, Hanghang Tong, Nicholas Valler,...
PVM
2010
Springer
15 years 3 months ago
Massively Parallel Finite Element Programming
Abstract. Today’s large finite element simulations require parallel algorithms to scale on clusters with thousands or tens of thousands of processor cores. We present data struc...
Timo Heister, Martin Kronbichler, Wolfgang Bangert...
SOCO
2010
Springer
15 years 3 months ago
Automatic circle detection on digital images with an adaptive bacterial foraging algorithm
This article presents an algorithm for the automatic detection of circular shapes from complicated and noisy images without using the conventional Hough transform methods. The prop...
Sambarta Dasgupta, Swagatam Das, Arijit Biswas, Aj...
TCOM
2010
92views more  TCOM 2010»
15 years 3 months ago
Detection of Gaussian constellations in MIMO systems under imperfect CSI
Abstract—This paper considers the problem of Gaussian symbols detection in MIMO systems in the presence of channel estimation errors. Under this framework we develop a computatio...
Ido Nevat, Gareth W. Peters, Jinhong Yuan
TKDE
2010
272views more  TKDE 2010»
15 years 3 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta