Sciweavers

1718 search results - page 123 / 344
» Simulating Network Robustness for Critical Infrastructure Ne...
Sort
View
TSP
2010
14 years 4 months ago
Greedy gossip with eavesdropping
Abstract-- This paper presents greedy gossip with eavesdropping (GGE), a new average consensus algorithm for wireless sensor network applications. Consensus algorithms have recentl...
Deniz Üstebay, Boris N. Oreshkin, Mark Coates...
IJAHUC
2007
135views more  IJAHUC 2007»
14 years 9 months ago
Service Location Protocols for mobile wireless ad hoc networks
: As service-oriented networks are essential in our lives, service location, access and provisioning over wired or wireless networks govern users’ satisfaction. While they are we...
Chai-Keong Toh, Guillermo Guichal, Dongkyun Kim, V...
GLOBECOM
2007
IEEE
15 years 4 months ago
Probabilistic-Based Rate Adaptation for IEEE 802.11 WLANs
— Collision awareness has been recognized as a critical component for effective rate adaptation schemes. Recently, several collision-aware rate adaptation schemes have been propo...
Xi Chen, Daji Qiao, Jeonggyun Yu, Sunghyun Choi
IROS
2007
IEEE
124views Robotics» more  IROS 2007»
15 years 4 months ago
Vocal imitation using physical vocal tract model
— A vocal imitation system was developed using a computational model that supports the motor theory of speech perception. A critical problem in vocal imitation is how to generate...
Hisashi Kanda, Tetsuya Ogata, Kazunori Komatani, H...
INFOCOM
1999
IEEE
15 years 2 months ago
Inference of Multicast Routing Trees and Bottleneck Bandwidths Using End-to-end Measurements
Abstract-- The efficacy of end-to-end multicast transport protocols depends critically upon their ability to scale efficiently to a large number of receivers. Several research mult...
Sylvia Ratnasamy, Steven McCanne