Sciweavers

5606 search results - page 1080 / 1122
» Randomization Techniques for Graphs.
Sort
View
BMCBI
2006
154views more  BMCBI 2006»
13 years 10 months ago
Automated recognition of malignancy mentions in biomedical literature
Background: The rapid proliferation of biomedical text makes it increasingly difficult for researchers to identify, synthesize, and utilize developed knowledge in their fields of ...
Yang Jin, Ryan T. McDonald, Kevin Lerman, Mark A. ...
CEE
2007
107views more  CEE 2007»
13 years 10 months ago
A non-preemptive scheduling algorithm for soft real-time systems
Real-time systems are often designed using preemptive scheduling and worst-case execution time estimates to guarantee the execution of high priority tasks. There is, however, an i...
Wenming Li, Krishna M. Kavi, Robert Akl
CORR
2007
Springer
126views Education» more  CORR 2007»
13 years 10 months ago
Optimal Throughput-Diversity-Delay Tradeoff in MIMO ARQ Block-Fading Channels
In this paper, we consider an automatic-repeat-request (ARQ) retransmission protocol signaling over a block-fading multiple-input, multiple-output (MIMO) channel. Unlike previous ...
Allen Chuang, Albert Guillen i Fabregas, Lars K. R...
JCIT
2008
129views more  JCIT 2008»
13 years 10 months ago
An Enhanced tree based MAODV Protocol for MANETs using Genetic Algorithm
Multicast routing protocols in Mobile Ad-hoc Networks (MANETs) are emerging for wireless group communication which includes application such as multipoint data dissemination and m...
E. Baburaj, V. Vasudevan
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 10 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
« Prev « First page 1080 / 1122 Last » Next »