Sciweavers

2484 search results - page 277 / 497
» Polymatroids with Network Coding
Sort
View
GCC
2007
Springer
14 years 2 months ago
Data Persistence in Structured P2P Networks with Redundancy Schemes
Data service is the principle application in structured P2P networks. And in many cases, we need the data to persist for a long time. So how to persist the data service and how lo...
Hongxing Li, Guihai Chen
ISCAS
2006
IEEE
90views Hardware» more  ISCAS 2006»
14 years 2 months ago
Feature competition in a spike-based winner-take-all VLSI network
— Recurrent networks and hardware analogs that perform a winner-take-all computation have been studied extensively. This computation is rarely demonstrated in a spiking network o...
Shih-Chii Liu, Matthias Oster
INFOSCALE
2006
ACM
14 years 2 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
SCOPES
2004
Springer
14 years 1 months ago
An Integer Linear Programming Approach to Classify the Communication in Process Networks
New embedded signal processing architectures are emerging that are composed of loosely coupled heterogeneous components like CPUs or DSPs, specialized IP cores, reconfigurable uni...
Alexandru Turjan, Bart Kienhuis, Ed F. Deprettere
INFOCOM
2003
IEEE
14 years 1 months ago
Impact of Interferences on Connectivity in Ad Hoc Networks
Abstract— We study the impact of interferences on the connectivity of large-scale ad-hoc networks, using percolation theory. We assume that a bi-directional connection can be set...
Olivier Dousse, François Baccelli, Patrick ...