Sciweavers

845 search results - page 143 / 169
» Connecting Many-Sorted Theories
Sort
View
JCM
2007
177views more  JCM 2007»
13 years 8 months ago
Collision Free MAC Protocols for Wireless Ad Hoc Networks based on BIBD Architecture
—Wireless Ad hoc networks represent a powerful telecommunication infrastructure that is being exploited for enabling general wireless networking connectivity for a variety of sig...
Pietro Camarda, Orazio Fiume
TNN
2008
78views more  TNN 2008»
13 years 8 months ago
Automatic Relevance Determination for Identifying Thalamic Regions Implicated in Schizophrenia
There have been many theories about and computational models of the schizophrenic disease state. Brain imaging techniques have suggested that abnormalities of the thalamus may con...
Antony Browne, Angela Jakary, S. Vinogradov, Yu Fu...
JEI
2007
144views more  JEI 2007»
13 years 8 months ago
Cost-based closed-contour representations
This paper presents an efficient technique for linking edge points in order to generate a closed-contour representation. It is based on the consecutive use of global and local sch...
Angel Domingo Sappa, Boris Xavier Vintimilla
TON
2008
106views more  TON 2008»
13 years 8 months ago
On static and dynamic partitioning behavior of large-scale P2P networks
Abstract--In this paper, we analyze the problem of network disconnection in the context of large-scale P2P networks and understand how both static and dynamic patterns of node fail...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...
CSUR
2004
91views more  CSUR 2004»
13 years 8 months ago
Line drawing, leap years, and Euclid
Bresenham's algorithm minimizes error in drawing lines on integer grid points; leap year calculations, surprisingly, are a generalization. We compare the two calculations, exp...
Mitchell A. Harris, Edward M. Reingold