Sciweavers

2715 search results - page 212 / 543
» Network bucket testing
Sort
View
NETWORKING
2007
14 years 2 days ago
Measuring Bandwidth Signatures of Network Paths
In this paper, we propose a practical and efficient technique, Forecaster, to estimate (1) the end-to-end available bandwidth, and (2) the speed of the most congested (tight) link ...
Mradula Neginhal, Khaled Harfoush, Harry G. Perros
DISOPT
2008
91views more  DISOPT 2008»
13 years 10 months ago
Partition inequalities for capacitated survivable network design based on directed p-cycles
We study the design of capacitated survivable networks using directed p-cycles. A p-cycle is a cycle with at least three arcs, used for rerouting disrupted flow during edge failur...
Alper Atamtürk, Deepak Rajan
JCO
2006
126views more  JCO 2006»
13 years 10 months ago
Minimum power assignment in wireless ad hoc networks with spanner property
Power assignment for wireless ad hoc networks is to assign a power for each wireless node such that the induced communication graph has some required properties. Recently research ...
Yu Wang 0003, Xiang-Yang Li
RAS
2006
134views more  RAS 2006»
13 years 10 months ago
Simultaneous planning, localization, and mapping in a camera sensor network
In this paper we examine issues of localization, exploration, and planning in the context of a hybrid robot/camera-network system. We exploit the ubiquity of camera networks to us...
Ioannis M. Rekleitis, David Meger, Gregory Dudek
IJON
2002
120views more  IJON 2002»
13 years 10 months ago
The recognition and analysis of animate objects using neural networks and active contour models
: In this paper we describe a method for tracking walking humans in the visual field. Active contour models are used to track moving objects in a sequence of images. The resulting ...
Ken Tabb, Neil Davey, Rod Adams, Stella J. George