Sciweavers

5227 search results - page 974 / 1046
» Enterprise modeling using class and instance models
Sort
View
CORR
2008
Springer
127views Education» more  CORR 2008»
13 years 7 months ago
On the long time behavior of the TCP window size process
The TCP window size process appears in the modeling of the famous Transmission Control Protocol used for data transmission over the Internet. This continuous time Markov process t...
Djalil Chafaï, Florent Malrieu, Katy Paroux
CORR
2008
Springer
133views Education» more  CORR 2008»
13 years 7 months ago
From Multi-Keyholes to Measure of Correlation and Power Imbalance in MIMO Channels: Outage Capacity Analysis
An information-theoretic analysis of a multi-keyhole channel, which includes a number of statistically independent keyholes with possibly different correlation matrices, is given. ...
George Levin, Sergey Loyka
EOR
2008
119views more  EOR 2008»
13 years 7 months ago
Market sharing dynamics between two service providers
We study the market partition between two distinct firms that deliver services to waiting time sensitive customers. In our model, the incoming customers select a firm on the basis...
Olivier Gallay, Max-Olivier Hongler
JMLR
2006
131views more  JMLR 2006»
13 years 7 months ago
On Representing and Generating Kernels by Fuzzy Equivalence Relations
Kernels are two-placed functions that can be interpreted as inner products in some Hilbert space. It is this property which makes kernels predestinated to carry linear models of l...
Bernhard Moser
JOIN
2006
113views more  JOIN 2006»
13 years 7 months ago
Local Detection of Selfish Routing Behavior in Ad Hoc Networks
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...