Sciweavers

2500 search results - page 407 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
ISNN
2010
Springer
14 years 2 months ago
Applications of Second Order Blind Identification to High-Density EEG-Based Brain Imaging: A Review
In the context of relating specific brain functions to specific brain structures, second-order blind identification (SOBI) is one of the blind source separation algorithms that hav...
Akaysha Tang
ISCC
2000
IEEE
100views Communications» more  ISCC 2000»
14 years 2 months ago
FATIMA: A Firewall-Aware Transparent Internet Mobility Architecture
Ubiquitous communication will be one of the paradigms for the next decades. The use of the Internet in such applications demands for a highly reliable and secure system, especiall...
Stefan Mink, Frank Pählke, Günter Sch&au...
ICNP
1999
IEEE
14 years 2 months ago
Scaling End-to-End Multicast Transports with a Topologically-Sensitive Group Formation Protocol
While the IP unicast service has proven successful, extending end-to-end adaptation to multicast has been a difficult problem. Unlike the unicast case, multicast protocols must su...
Sylvia Ratnasamy, Steven McCanne
ICPPW
1999
IEEE
14 years 2 months ago
Design of MOBILE MOM: Message Oriented Middleware Service for Mobile Computing
Message oriented middleware (MOM) is a specific class of middleware that operates on the principles of message passing or message queuing. Existing MOM syste doesn't support ...
Do-Guen Jung, Kwang-Jin Paek, Tai-Yun Kim
DSOM
1999
Springer
14 years 2 months ago
Programmable Agents for Active Distributed Monitoring
Abstract. The successful deploymentof next-generation distributedsystems is signi cantly dependent on the e cient management support that improves the performance and reliability o...
Ehab S. Al-Shaer