Sciweavers

280 search results - page 14 / 56
» Connection strategies in neocortical networks
Sort
View
IEAAIE
2010
Springer
13 years 5 months ago
Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation
The ability for a user to accurately estimate the amount of trust to be placed in a peer user is gaining more and more attention in social network applications. Trust aggregation p...
Nele Verbiest, Chris Cornelis, Patricia Victor, En...
WIOPT
2011
IEEE
12 years 11 months ago
Energy-neutral source-channel coding in energy-harvesting wireless sensors
Abstract—This work addresses the problem of energy allocation over source compression and transmission for a single energy-harvesting sensor. An optimal class of policies is iden...
Paolo Castiglione, Osvaldo Simeone, Elza Erkip, Th...
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 1 months ago
A Stochastic Framework for Scheduling in Wireless Packet Access Networks
— We put forth a unified framework for downlink and uplink scheduling of multiple connections with diverse qualityof-service requirements, where each connection transmits using ...
Xin Wang, Georgios B. Giannakis
TSMC
2010
13 years 2 months ago
Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs
In mobile ad hoc networks, nodes have the inherent ability to move. Aside from conducting attacks to maximize their utility and cooperating with regular nodes to deceive them, mali...
Feng Li, Yinying Yang, Jie Wu
CISS
2008
IEEE
14 years 2 months ago
Overlay protection against link failures using network coding
Abstract—This paper introduces a network coding-based protection scheme against single and multiple link failures. The proposed strategy makes sure that in a connection, each nod...
Ahmed E. Kamal, Aditya Ramamoorthy