Sciweavers

908 search results - page 77 / 182
» Computational methodologies for modelling, analysis and simu...
Sort
View
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Bound analysis of closed queueing networks with workload burstiness
Burstiness and temporal dependence in service processes are often found in multi-tier architectures and storage devices and must be captured accurately in capacity planning models...
Giuliano Casale, Ningfang Mi, Evgenia Smirni
ICANN
2010
Springer
13 years 9 months ago
Self-Organization of Steerable Topographic Mappings as Basis for Translation Invariance
One way to handle the perception of images that change in position (or size, orientation or deformation) is to invoke rapidly changing fiber projections to project images into a fi...
Junmei Zhu, Urs Bergmann, Christoph von der Malsbu...
PODC
2010
ACM
13 years 5 months ago
Brief announcement: distributed contention resolution in wireless networks
We present and analyze simple distributed contention resolution protocols for wireless networks. In our setting, one is given n pairs of senders and receivers located in a metric ...
Thomas Kesselheim, Berthold Vöcking
IEEEHPCS
2010
13 years 6 months ago
Analytical modeling and evaluation of network-on-chip architectures
Network-on-chip (NoC) architectures adopted for Systemon-Chip (SoC) are characterized by different trade-offs between latency, throughput, communication load, energy consumption, ...
Suboh A. Suboh, Mohamed Bakhouya, Jaafar Gaber, Ta...
DIS
2009
Springer
13 years 11 months ago
Discovering Influential Nodes for SIS Models in Social Networks
We address the problem of efficiently discovering the influential nodes in a social network under the susceptible/infected/susceptible (SIS) model, a diffusion model where nodes ar...
Kazumi Saito, Masahiro Kimura, Hiroshi Motoda