Sciweavers

5506 search results - page 834 / 1102
» Minimal Logic Programs
Sort
View
136
Voted
NETWORKS
2007
15 years 2 months ago
Vertex disjoint routings of cycles over tori
We study the problem of designing a survivable WDM network based on covering the communication requests with subnetworks that are protected independently from each other. We consi...
Jean-Claude Bermond, Min-Li Yu
161
Voted
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 26 days ago
A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks
The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques that plays influential role in ensuring the desired Quality of Service (QoS) to the users...
H. S. Ramesh Babu, Gowrishankar, P. S. Satyanaraya...
310
Voted
ACTA
2011
14 years 9 months ago
Nonatomic dual bakery algorithm with bounded tokens
A simple mutual exclusion algorithm is presented that only uses nonatomic shared variables of bounded size, and that satisfies bounded overtaking. When the shared variables behave...
Alex A. Aravind, Wim H. Hesselink
CN
2011
111views more  CN 2011»
14 years 6 months ago
On the design of network control and management plane
We provide a design of a control and management plane for data networks using the abstraction of 4D architecture, utilizing and extending 4D’s concept of a logically centralized...
Hammad Iqbal, Taieb Znati
142
Voted
ICIP
2001
IEEE
16 years 4 months ago
Facial parameter extraction system based on active contours
This paper addresses the application of active contours or snakes for location and tracking of facial features. Conventional snake approaches find the position of the snake by fin...
Montse Pardàs, Marcos Losada