Sciweavers

15644 search results - page 3108 / 3129
» Brittle System Analysis
Sort
View
IJBRA
2010
134views more  IJBRA 2010»
13 years 6 months ago
Deterministic graph-theoretic algorithm for detecting modules in biological interaction networks
—Accumulating evidence suggests that biological systems exhibit modular organization. Accurate identification of modularity is vital for understanding this organization. A recen...
Roger L. Chang, Feng Luo, Stuart Johnson, Richard ...
INFOCOM
2010
IEEE
13 years 6 months ago
Enabling a Bufferless Core Network Using Edge-to-Edge Packet-Level FEC
— Internet traffic is expected to grow phenomenally over the next five to ten years, and to cope with such large traffic volumes, core networks are expected to scale to capaci...
Arun Vishwanath, Vijay Sivaraman, Marina Thottan, ...
INFOCOM
2010
IEEE
13 years 6 months ago
Low-complexity Scheduling Algorithms for Multi-channel Downlink Wireless Networks
—This paper considers the problem of designing scheduling algorithms for multi-channel (e.g., OFDM) wireless downlink networks with n users/OFDM sub-channels. For this system, wh...
Shreeshankar Bodas, Sanjay Shakkottai, Lei Ying, R...
INFOCOM
2010
IEEE
13 years 6 months ago
A Signal Processing View on Packet Sampling and Anomaly Detection
—Anomaly detection methods typically operate on pre-processed, i.e., sampled and aggregated, traffic traces. Most traffic capturing devices today employ random packet sampling,...
Daniela Brauckhoff, Kavé Salamatian, Martin...
IOR
2010
169views more  IOR 2010»
13 years 6 months ago
Dynamic Supplier Contracts Under Asymmetric Inventory Information
In this paper, we examine a supply chain in which a single supplier sells to a downstream retailer. We consider a multi-period model, with the following sequence of events. In per...
Hao Zhang, Mahesh Nagarajan, Greys Sosic
« Prev « First page 3108 / 3129 Last » Next »