Sciweavers

2283 search results - page 372 / 457
» Bounds of Graph Characteristics
Sort
View
INFOCOM
2002
IEEE
14 years 27 days ago
Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement
IEEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the I...
Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, ...
CDC
2009
IEEE
225views Control Systems» more  CDC 2009»
14 years 21 days ago
High performance adaptive robust control for nonlinear system with unknown input backlash
—A high performance adaptive robust control (ARC) algorithm is developed for a class of nonlinear system with unknown input backlash, parametric uncertainties and uncertain nonli...
Jian Guo, Bin Yao, Qingwei Chen, Xiaobei Wu
GECCO
2009
Springer
110views Optimization» more  GECCO 2009»
14 years 18 days ago
EMO shines a light on the holes of complexity space
Typical domains used in machine learning analyses only partially cover the complexity space, remaining a large proportion of problem difficulties that are not tested. Since the ac...
Núria Macià, Albert Orriols-Puig, Es...
CSFW
1999
IEEE
14 years 9 days ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
ICDCS
1997
IEEE
14 years 5 days ago
Distributed Recovery with K-Optimistic Logging
Fault-tolerance techniques based on checkpointing and message logging have been increasingly used in real-world applications to reduce service down-time. Most industrial applicati...
Yi-Min Wang, Om P. Damani, Vijay K. Garg