Sciweavers

206 search results - page 14 / 42
» Analyzing the Parameters of Prey-Predator Models for Simulat...
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
Constrained Stochastic Games in Wireless Networks
—We consider the situation where N nodes share a common access point. With each node i there is an associated buffer and channel state that change in time. Node i dynamically cho...
Eitan Altaian, Konstantin Avrachenkov, Nicolas Bon...
ICMCS
2009
IEEE
106views Multimedia» more  ICMCS 2009»
13 years 6 months ago
Modeling and analysis of content identification
Content fingerprinting provides a compact content-based representation of a multimedia document. An important application of fingerprinting is the identification of modified copie...
Avinash L. Varna, Min Wu
GLOBECOM
2007
IEEE
14 years 9 days ago
Optimal Configuration of 802.11e EDCA Under Voice Traffic
In this paper we first present a model to analyze the average and standard deviation of the delay in a 802.11e EDCA WLAN under voice traffic. Next, based on this model, we compute ...
Pablo Serrano, Albert Banchs, José Fé...
ANSS
2004
IEEE
14 years 5 days ago
Optimized Dissemination of Highly Anticipated Content over an Itinerary Based P2P Network
As the Internet evolved, peer-to-peer networks became one of the major enabling technologies. Alternative solutions for several issues emerged with the use o this technology. Such...
Konstantinos G. Zerfiridis, Helen D. Karatza
JMLR
2006
105views more  JMLR 2006»
13 years 8 months ago
Linear State-Space Models for Blind Source Separation
We apply a type of generative modelling to the problem of blind source separation in which prior knowledge about the latent source signals, such as time-varying auto-correlation a...
Rasmus Kongsgaard Olsson, Lars Kai Hansen