Sciweavers

413 search results - page 76 / 83
» Lattice Boltzmann Method
Sort
View
MOBIMEDIA
2007
13 years 10 months ago
Performance evaluation of IEEE 802.11e based on ON-OFF traffic model
We investigate the performance of the IEEE 802.11e while emphasizing on the end-to-end delay performance. In our MAC delay analysis, we are based on elementary conditional probabi...
Ioannis Papapanagiotou, John S. Vardakas, Georgios...
GECCO
2008
Springer
164views Optimization» more  GECCO 2008»
13 years 9 months ago
Genetic algorithms with local search optimization for protein structure prediction problem
This paper presents a new Genetic Algorithm for Protein Structure Prediction problem in both 2D and 3D hydrophobichydrophilic lattice models, introduced in [1]. Our algorithm evol...
Igor Berenboym, Mireille Avigal
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 8 months ago
Dirty Paper Coding using Sign-bit Shaping and LDPC Codes
Dirty paper coding (DPC) refers to methods for pre-subtraction of known interference at the transmitter of a multiuser communication system. There are numerous applications for DPC...
G. Shilpa, Andrew Thangaraj, Srikrishna Bhashyam
FUIN
2008
108views more  FUIN 2008»
13 years 8 months ago
Radial View of Continuous Cellular Automata
Continuous cellular automata (or coupled map lattices) are cellular automata where the state of the cells are real values in [0, 1] and the local transition rule is a real function...
Paola Flocchini, Vladimir Cezar
TDSC
2008
152views more  TDSC 2008»
13 years 8 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...