Sciweavers

1663 search results - page 279 / 333
» Validation and Verification of Simulation Models
Sort
View
131
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
The Impact of Mobility on Gossip Algorithms
—We analyze how node mobility can influence the convergence time of averaging gossip algorithms on networks. Our main result is that even a small number of fully mobile nodes ca...
Anand D. Sarwate, Alexandros G. Dimakis
75
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Joint base-calling of two DNA sequences with factor graphs
—Automated estimation of DNA base-sequences is an important step in genomics and in many other emerging fields in biological and medical sciences. Current automated sequencers p...
Xiaomeng Shi, Desmond S. Lun, Jim Meldrim, Ralf K&...
89
Voted
ISCAS
2008
IEEE
110views Hardware» more  ISCAS 2008»
15 years 10 months ago
Distortion calculation of an asynchronous switching xDSL line-driver
Abstract—Since the xDSL specifications impose stringent linearity requirements to ensure the integrity of the data transferred, current line drivers use linear amplifiers. The do...
Vincent De Gezelle, Jordie Buyle, Jan Doutreloigne
132
Voted
PIMRC
2008
IEEE
15 years 10 months ago
Performance analysis of cooperative communications from MAC layer perspectives
—In recent years, cooperative communication has been proposed as a new communication paradigm that incorporates a relay node to assist the direct point-to-point transmission. By ...
Chun-Chieh Liao, Yu-Pin Hsu, Kai-Ten Feng
134
Voted
ICDCS
2007
IEEE
15 years 10 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee