Sciweavers

408 search results - page 50 / 82
» Network laws
Sort
View
ICNSC
2007
IEEE
14 years 4 months ago
Unstable Object Stabilization and Control Using a DD Robot Manipulator
— This paper addresses the issue of robotic manipulation of multi-DOF inverted pendulums. A control scheme is designed using Lyaponov stability theory for both the robot position...
Zhao-Hui Jiang, Kouya Kamise
WCNC
2010
IEEE
14 years 1 months ago
Hierarchical Alphabet and Parametric Channel Constrained Capacity Regions for HDF Strategy in Parametric Wireless 2-WRC
Abstract—The paper addresses wireless the 2-Way Relay Channel (2-WRC) system with a Hierarchical Decode and Forward strategy. This strategy uses a Hierarchical eXclusive Code (HX...
Jan Sykora, Alister G. Burr
SDM
2004
SIAM
229views Data Mining» more  SDM 2004»
13 years 11 months ago
R-MAT: A Recursive Model for Graph Mining
How does a `normal' computer (or social) network look like? How can we spot `abnormal' sub-networks in the Internet, or web graph? The answer to such questions is vital ...
Deepayan Chakrabarti, Yiping Zhan, Christos Falout...
TON
2010
68views more  TON 2010»
13 years 8 months ago
Upgrading mice to elephants: effects and end-point solutions
Abstract— Short TCP flows may suffer significant responsetime performance degradations during network congestion. Unfortunately, this creates an incentive for misbehavior by cl...
Amit Mondal, Aleksandar Kuzmanovic
ICNS
2009
IEEE
13 years 7 months ago
Supporting High-Tech Crime Investigation through Dynamic Service Integration
In this paper we introduce the idea of integrating high security level services to support law enforcement with high-tech crime investigation. We take advantage of a process-orien...
Cezary Mazurek, Maciej Stroinski, Dariusz Walczak,...