Sciweavers

5234 search results - page 931 / 1047
» Simulation of Computer Network Attacks
Sort
View
127
Voted
DSS
2006
116views more  DSS 2006»
15 years 3 months ago
Matching knowledge elements in concept maps using a similarity flooding algorithm
Concept mapping systems used in education and knowledge management emphasize flexibility of representation to enhance learning and facilitate knowledge capture. Collections of con...
Byron Marshall, Hsinchun Chen, Therani Madhusudan
PE
2006
Springer
125views Optimization» more  PE 2006»
15 years 3 months ago
Approximating multi-skill blocking systems by HyperExponential Decomposition
We consider multi-class blocking systems in which jobs require a single processing step. There are groups of servers that can each serve a different subset of all job classes. The...
Geert Jan Franx, Ger Koole, Auke Pot
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
Analysis of a gossip protocol in PRISM
Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout dynamically changing networks. We present an analysis of a gossip pro...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
146
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Non-centralized target tracking with mobile agents
In this paper we consider the problem of target tracking in a network of mobile agents. We propose a scheme with agents that are endowed with processing and decision-making capabi...
Petar M. Djuric, Jonathan Beaudeau, Mónica ...
DAC
2000
ACM
16 years 4 months ago
MINFLOTRANSIT: min-cost flow based transistor sizing tool
This paper presents MINFLOTRANSIT, a new transistor sizing tool for fast sizing of combinational circuits with minimal cost. MINFLOTRANSIT is an iterative relaxation based tool th...
Vijay Sundararajan, Sachin S. Sapatnekar, Keshab K...