Sciweavers

3374 search results - page 524 / 675
» Explaining Similarity of Terms
Sort
View
125
Voted
CORR
2010
Springer
156views Education» more  CORR 2010»
15 years 4 months ago
Topological analysis of the power grid and mitigation strategies against cascading failures
This paper presents a complex systems overview of a power grid network under cascading conditions. The cascading effect has been simulated on three different networks, the IEEE 300...
Sakshi Pahwa, Amelia Hodges, Caterina M. Scoglio, ...
126
Voted
CORR
2010
Springer
105views Education» more  CORR 2010»
15 years 4 months ago
Molecular Recognition as an Information Channel: The Role of Conformational Changes
Molecular recognition, which is essential in processing information in biological systems, takes place in a crowded noisy biochemical environment and requires the recognition of a ...
Yonatan Savir, Tsvi Tlusty
CVIU
2008
82views more  CVIU 2008»
15 years 4 months ago
Shape matching and registration by data-driven EM
In this paper, we present an efficient and robust algorithm for shape matching, registration, and detection. The task is to geometrically transform a source shape to fit a target ...
Zhuowen Tu, Songfeng Zheng, Alan L. Yuille
CCR
2006
81views more  CCR 2006»
15 years 4 months ago
LTCP: improving the performance of TCP in highspeed networks
In this paper, we propose Layered TCP (LTCP for short), a set of simple modifications to the congestion window response of TCP to make it more scalable in highspeed networks. LTCP...
Sumitha Bhandarkar, Saurabh Jain, A. L. Narasimha ...
CCR
2006
76views more  CCR 2006»
15 years 4 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato