Sciweavers

1791 search results - page 285 / 359
» Behavioral Operations
Sort
View
210
Voted
TMC
2010
137views more  TMC 2010»
14 years 9 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
224
Voted
TON
2010
192views more  TON 2010»
14 years 9 months ago
Delay analysis for wireless networks with single hop traffic and general interference constraints
We consider a class of wireless networks with general interference constraints on the set of links that can be served simultaneously at any given time. We restrict the traffic to b...
Gagan Raj Gupta, Ness B. Shroff
179
Voted
TON
2010
188views more  TON 2010»
14 years 9 months ago
Self-Chord: A Bio-Inspired P2P Framework for Self-Organizing Distributed Systems
This paper presents "Self-Chord," a peer-to-peer (P2P) system that inherits the ability of Chord-like structured systems for the construction and maintenance of an overla...
Agostino Forestiero, Emilio Leonardi, Carlo Mastro...
AGI
2011
14 years 6 months ago
Learning Problem Solving Skills from Demonstration: An Architectural Approach
We present an architectural approach to learning problem solving skills from demonstration, using internal models to represent problem-solving operational knowledge. Internal forwa...
Haris Dindo, Antonio Chella, Giuseppe La Tona, Mon...
INFOCOM
2011
IEEE
14 years 6 months ago
RelSamp: Preserving application structure in sampled flow measurements
—The Internet has significantly evolved in the number and variety of applications. Network operators need mechanisms to constantly monitor and study these applications. Given mo...
Myungjin Lee, Mohammad Y. Hajjat, Ramana Rao Kompe...