Sciweavers

5234 search results - page 794 / 1047
» Simulation of Computer Network Attacks
Sort
View
BROADNETS
2005
IEEE
15 years 10 months ago
Performance analysis of the ieee 802.11e block ACK scheme in a noisy channel
— A Block ACK (BTA) scheme has been proposed in IEEE 802.11e to improve medium access control (MAC) layer performance. It is also a promising technique for next-generation high-s...
Tianji Li, Qiang Ni, Thierry Turletti, Yang Xiao
WIOPT
2005
IEEE
15 years 10 months ago
On the Predictability of Link Lifetimes in Urban MANETs
Link lifetime prediction is occurs frequently in MANET routing protocols. For example, in assigning cache timeout values and route durations, routing protocols make implicit predi...
Stephan Bohacek, Andjela Ilic, Vinay Sridhara
ICANN
2005
Springer
15 years 10 months ago
A Gradient Rule for the Plasticity of a Neuron's Intrinsic Excitability
While synaptic learning mechanisms have always been a core topic of neural computation research, there has been relatively little work on intrinsic learning processes, which change...
Jochen Triesch
ISNN
2005
Springer
15 years 10 months ago
A Learning Framework for Blind Source Separation Using Generalized Eigenvalues
This paper presents a learning framework for blind source separation (BSS), in which the BSS is formulated as generalized Eigenvalue (GE) problem. Compared to the typical informati...
Hailin Liu, Yiu-ming Cheung
ICAISC
2004
Springer
15 years 10 months ago
On Application of Ant Algorithms to Non-bifurcated Multicommodity Flow Problem
Our discussion in this article centers on the application of ant algorithms to the non-bifurcated multicommodity flow problem. We propose a general framework of ant algorithm that...
Krzysztof Walkowiak