Sciweavers

5234 search results - page 850 / 1047
» Simulation of Computer Network Attacks
Sort
View
WMASH
2003
ACM
15 years 9 months ago
End-to-end throughput and delay assurances in multihop wireless hotspots
Next generation Wireless Local Area Networks (WLAN’s) are likely to require multihop wireless connections between mobile nodes and Internet gateways to achieve high data rates f...
Kuang-Ching Wang, Parameswaran Ramanathan
GIS
2009
ACM
15 years 8 months ago
Machine learning approach to report prioritization with an application to travel time dissemination
This paper looks at the problem of data prioritization, commonly found in mobile ad-hoc networks. The proposed general solution uses a machine learning approach in order to learn ...
Piotr Szczurek, Bo Xu, Jie Lin, Ouri Wolfson
DAGM
2008
Springer
15 years 6 months ago
Optical Rails
We present a view-based method for steering a robot in a network of positions; this includes navigation along a prerecorded path, but also allows for arbitrary movement of the robo...
Holger Friedrich, David Dederscheck, Eduard Rosert...
NN
2008
Springer
169views Neural Networks» more  NN 2008»
15 years 4 months ago
Modeling a flexible representation machinery of human concept learning
dely acknowledged that categorically organized abstract knowledge plays a significant role in high-order human cognition. Yet, there are many unknown issues about the nature of ho...
Toshihiko Matsuka, Yasuaki Sakamoto, Arieta Chouch...
TWC
2008
87views more  TWC 2008»
15 years 4 months ago
A token-based scheduling scheme for WLANs supporting voice/data traffic and its performance analysis
Most of the existing medium access control (MAC) protocols for wireless local area networks (WLANs) provide prioritized access by adjusting the contention window sizes or interfram...
Ping Wang, Weihua Zhuang