Sciweavers

1663 search results - page 281 / 333
» Verification and validation of simulation models
Sort
View
DATE
2005
IEEE
108views Hardware» more  DATE 2005»
15 years 3 months ago
A Technology-Aware and Energy-Oriented Topology Exploration for On-Chip Networks
As packet-switching interconnection networks replace buses and dedicated wires to become the standard on-chip interconnection fabric, reducing their power consumption has been ide...
Hangsheng Wang, Li-Shiuan Peh, Sharad Malik
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
15 years 3 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
WOWMOM
2005
ACM
90views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Saturation Throughput Analysis of a System of Interfering IEEE 802.11 WLANs
IEEE 802.11 wireless local area networks that span large buildings or campuses must comprise multiple cells, several of which must necessarily be cochannel cells. It can be shown ...
Manoj K. Panda, Anurag Kumar, S. H. Srinivasan
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 3 months ago
Takeover time curves in random and small-world structured populations
We present discrete stochastic mathematical models for the growth curves of synchronous and asynchronous evolutionary algorithms with populations structured according to a random ...
Mario Giacobini, Marco Tomassini, Andrea Tettamanz...
ACMICEC
2004
ACM
161views ECommerce» more  ACMICEC 2004»
15 years 3 months ago
The 2003 Supply Chain Management Trading Agent Competition
Supply Chain Management deals with the planning and coordination of bidding, production and procurement activities across the multiple organizations involved in the delivery of on...
Raghu Arunachalam, Norman M. Sadeh