Sciweavers

6656 search results - page 1303 / 1332
» Change, Change, Change: Three Approaches
Sort
View
CN
2010
160views more  CN 2010»
13 years 9 months ago
ABS: Adaptive buffer sizing for heterogeneous networks
Most existing criteria [3], [5], [8] for sizing router buffers rely on explicit formulation of the relationship between buffer size and characteristics of Internet traffic. However...
Yueping Zhang, Dmitri Loguinov
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 9 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 9 months ago
Certifying floating-point implementations using Gappa
High confidence in floating-point programs requires proving numerical properties of final and intermediate values. One may need to guarantee that a value stays within some range, ...
Florent de Dinechin, Christoph Quirin Lauter, Guil...
CORR
2008
Springer
213views Education» more  CORR 2008»
13 years 9 months ago
Between conjecture and memento: shaping a collective emotional perception of the future
Abstract Microblogging is a form of online communication by which users broadcast brief text updates, also known as tweets, to the public or a selected circle of contacts. A varieg...
Alberto Pepe, Johan Bollen
CORR
2010
Springer
169views Education» more  CORR 2010»
13 years 9 months ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari
« Prev « First page 1303 / 1332 Last » Next »