Sciweavers

4435 search results - page 833 / 887
» Networking named content
Sort
View
NN
1998
Springer
177views Neural Networks» more  NN 1998»
13 years 9 months ago
Soft vector quantization and the EM algorithm
The relation between hard c-means (HCM), fuzzy c-means (FCM), fuzzy learning vector quantization (FLVQ), soft competition scheme (SCS) of Yair et al. (1992) and probabilistic Gaus...
Ethem Alpaydin
TCSV
2002
101views more  TCSV 2002»
13 years 9 months ago
Error-resilient video transcoding for robust internetwork communications using GPRS
Abstract--A novel fully comprehensive mobile video communications system is proposed in this paper. This system exploits the useful rate management features of the video transcoder...
Safak Dogan, Akin Cellatoglu, Mustafa Uyguroglu, A...
COMCOM
2010
95views more  COMCOM 2010»
13 years 8 months ago
Trading link utilization for queueing delays: An adaptive approach
Understanding the relationship between queueing delays and link utilization for general traffic conditions is an important open problem in networking research. Difficulties in und...
Rade Stanojevic, Robert Shorten
LICS
2010
IEEE
13 years 8 months ago
Abstracting the Differential Semantics of Rule-Based Models: Exact and Automated Model Reduction
ing the differential semantics of rule-based models: exact and automated model reduction (Invited Lecture) Vincent Danos∗§, J´erˆome Feret†, Walter Fontana‡, Russell Harme...
Vincent Danos, Jérôme Feret, Walter F...
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 7 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig