Sciweavers

1520 search results - page 115 / 304
» The Ring Loading Problem
Sort
View
136
Voted
ICNP
1996
IEEE
15 years 2 months ago
A Comparison of Known Classes of Reliable Multicast Protocols
We analyze the maximum throughput that the known classes of reliable multicast protocols can attain. A new taxonomy of reliable multicast protocols is introduced based on the prem...
Brian Neil Levine, J. J. Garcia-Luna-Aceves
66
Voted
STOC
1996
ACM
92views Algorithms» more  STOC 1996»
15 years 2 months ago
Constructing Evolutionary Trees in the Presence of Polymorphic Characters
Abstract. Most phylogenetics literature and construction methods based upon characters presume monomorphism (one state per character per species), yet polymorphism (multiple states...
Maria Luisa Bonet, Cynthia A. Phillips, Tandy Warn...
ICSAP
2010
15 years 8 days ago
Tamper Proofing 3D Models
- This paper describes a novel algorithm designed for tamper proofing of 3D models. Fragile watermarking is a known technique for detecting location of tamper in the artwork. Howev...
Mukesh C. Motwani, Balaji Sridharan, Rakhi C. Motw...
66
Voted
IJON
2007
117views more  IJON 2007»
14 years 10 months ago
Learning sensory representations with intrinsic plasticity
Intrinsic plasticity (IP) refers to a neuron’s ability to regulate its firing activity by adapting its intrinsic excitability. Previously, we showed that model neurons combinin...
Nicholas Butko, Jochen Triesch
79
Voted
JACM
2007
85views more  JACM 2007»
14 years 10 months ago
The rational numbers as an abstract data type
onal Numbers as an Abstract Data Type1 J A Bergstra2 University of Amsterdam, Informatics Institute, Kruislaan 403, 1098 SJ Amsterdam, The Netherlands J V Tucker3 Department of Com...
Jan A. Bergstra, J. V. Tucker