Sciweavers

908 search results - page 153 / 182
» Computational methodologies for modelling, analysis and simu...
Sort
View
NECO
2007
258views more  NECO 2007»
13 years 7 months ago
Reinforcement Learning Through Modulation of Spike-Timing-Dependent Synaptic Plasticity
The persistent modification of synaptic efficacy as a function of the relative timing of pre- and postsynaptic spikes is a phenomenon known as spiketiming-dependent plasticity (...
Razvan V. Florian
TWC
2008
109views more  TWC 2008»
13 years 7 months ago
Service Time Approximation in IEEE 802.11 Single-Hop Ad Hoc Networks
Abstract-- This paper investigates the near-memoryless behavior of the service time for IEEE 802.11 saturated single-hop ad hoc networks. We show that the number of packets success...
Atef Abdrabou, Weihua Zhuang
CCS
2009
ACM
14 years 2 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
SIGCOMM
2004
ACM
14 years 1 months ago
Network sensitivity to hot-potato disruptions
Hot-potato routing is a mechanism employed when there are multiple (equally good) interdomain routes available for a given destination. In this scenario, the Border Gateway Protoc...
Renata Teixeira, Aman Shaikh, Timothy Griffin, Geo...
SIGCOMM
2010
ACM
13 years 8 months ago
NetFence: preventing internet denial of service from inside out
Denial of Service (DoS) attacks frequently happen on the Internet, paralyzing Internet services and causing millions of dollars of financial loss. This work presents NetFence, a s...
Xin Liu, Xiaowei Yang, Yong Xia