Sciweavers

1663 search results - page 279 / 333
» Verification and validation of simulation models
Sort
View
INFOCOM
2009
IEEE
15 years 4 months ago
The Impact of Mobility on Gossip Algorithms
—We analyze how node mobility can influence the convergence time of averaging gossip algorithms on networks. Our main result is that even a small number of fully mobile nodes ca...
Anand D. Sarwate, Alexandros G. Dimakis
ICASSP
2008
IEEE
15 years 4 months ago
Joint base-calling of two DNA sequences with factor graphs
—Automated estimation of DNA base-sequences is an important step in genomics and in many other emerging fields in biological and medical sciences. Current automated sequencers p...
Xiaomeng Shi, Desmond S. Lun, Jim Meldrim, Ralf K&...
ISCAS
2008
IEEE
110views Hardware» more  ISCAS 2008»
15 years 4 months ago
Distortion calculation of an asynchronous switching xDSL line-driver
Abstract—Since the xDSL specifications impose stringent linearity requirements to ensure the integrity of the data transferred, current line drivers use linear amplifiers. The do...
Vincent De Gezelle, Jordie Buyle, Jan Doutreloigne
PIMRC
2008
IEEE
15 years 4 months ago
Performance analysis of cooperative communications from MAC layer perspectives
—In recent years, cooperative communication has been proposed as a new communication paradigm that incorporates a relay node to assist the direct point-to-point transmission. By ...
Chun-Chieh Liao, Yu-Pin Hsu, Kai-Ten Feng
ICDCS
2007
IEEE
15 years 4 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee