Sciweavers

5105 search results - page 44 / 1021
» An algorithm to determine peer-reviewers
Sort
View
SPIN
2000
Springer
14 years 2 months ago
Modeling the ASCB-D Synchronization Algorithm with SPIN: A Case Study
In this paper, we describe our application of SPIN 1 to model an algorithm used to synchronize the clocks of modules that provide periodic real-time communication over a network. W...
Nicholas Weininger, Darren D. Cofer
SODA
1992
ACM
109views Algorithms» more  SODA 1992»
14 years 4 days ago
New Algorithms for Minimum Area k-gons
Given a set P of n points in the plane, we wish to find a set Q P of k points for which the convex hull conv(Q) has the minimum area. We solve this, and the related problem of fi...
David Eppstein
ICPR
2008
IEEE
14 years 5 months ago
Scale-invariant density-based clustering initialization algorithm and its application
In this paper, we bring out a new density-based clustering initialization algorithm which is invariant to the scale factor. Instead of using the scale factor while the cluster ini...
Chunsheng Hua, Ryusuke Sagawa, Yasushi Yagi
VALUETOOLS
2006
ACM
156views Hardware» more  VALUETOOLS 2006»
14 years 5 months ago
TCP-Illinois: a loss and delay-based congestion control algorithm for high-speed networks
— We introduce a new congestion control algorithm for high speed networks, called TCP-Illinois. TCP-Illinois uses packet loss information to determine whether the window size sho...
Shao Liu, Tamer Basar, R. Srikant
ISCIS
2004
Springer
14 years 4 months ago
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks
Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs a...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...