Sciweavers

22193 search results - page 4339 / 4439
» Multiple Restricted Multiplication
Sort
View
141
Voted
JCM
2010
119views more  JCM 2010»
15 years 1 months ago
Evaluation of Router Implementations for Explicit Congestion Control Schemes
— Explicit congestion control schemes use router feedback to overcome limitations of the standard mechanisms of the Transmission Control Protocol (TCP). These approaches require ...
Simon Hauger, Michael Scharf, Jochen Kögel, C...
139
Voted
JCO
2010
99views more  JCO 2010»
15 years 1 months ago
Online scheduling with a buffer on related machines
Online scheduling with a buffer is a semi-online problem which is strongly related to the basic online scheduling problem. Jobs arrive one by one and are to be assigned to paralle...
György Dósa, Leah Epstein
133
Voted
JIDM
2010
145views more  JIDM 2010»
15 years 1 months ago
Mining Relevant and Extreme Patterns on Climate Time Series with CLIPSMiner
One of the most important challenges for the researchers in the 21st Century is related to global heating and climate change that can have as consequence the intensification of na...
Luciana A. S. Romani, Ana Maria Heuminski de &Aacu...
114
Voted
JMLR
2010
157views more  JMLR 2010»
15 years 1 months ago
Kronecker Graphs: An Approach to Modeling Networks
How can we generate realistic networks? In addition, how can we do so with a mathematically tractable model that allows for rigorous analysis of network properties? Real networks ...
Jure Leskovec, Deepayan Chakrabarti, Jon M. Kleinb...
132
Voted
JSAC
2010
135views more  JSAC 2010»
15 years 1 months ago
Provisioning mission-critical telerobotic control systems over internet backbone networks with essentially-perfect QoS
—Over the next decades, the Internet will evolve to support increasingly complex mission-critical services such as telerobotically controlled surgery. The world’s first telero...
T. H. Szymanski, D. Gilbert
« Prev « First page 4339 / 4439 Last » Next »