Sciweavers

334 search results - page 30 / 67
» Approximation Algorithms for Non-Uniform Buy-at-Bulk Network...
Sort
View
ICCAD
2003
IEEE
113views Hardware» more  ICCAD 2003»
14 years 5 months ago
Branch Merge Reduction of RLCM Networks
— In this paper we consider the problem of finding a smaller RLCM circuit that approximately replicates the behavior (up to a certain frequency) of a given RLCM circuit. Targeted...
Bernard N. Sheehan
ICNP
2000
IEEE
14 years 1 months ago
A Topology-Independent Fair Queueing Model in Ad Hoc Wireless Networks
Fair queueing of rate and delay-sensitive packet flows in a shared-medium, multihop wireless network remains largely unaddressed because of the unique design issues such as locat...
Haiyun Luo, Songwu Lu
ICDCSW
2005
IEEE
14 years 2 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
ICANN
2005
Springer
14 years 2 months ago
Interpolation Mechanism of Functional Networks
In this paper, the interpolation mechanism of functional networks is discussed. A kind of fourlayer (with 1 input and 1 output unit) and a five-layer (with double input and single...
Yong-Quan Zhou, Licheng Jiao
ICNP
2007
IEEE
14 years 3 months ago
Slotted Scheduled Tag Access in Multi-Reader RFID Systems
Abstract—Radio frequency identification (RFID) is a technology where a reader device can “sense” the presence of a closeby object by reading a tag device attached to the obj...
Zongheng Zhou, Himanshu Gupta, Samir R. Das, Xianj...