Sciweavers

833 search results - page 66 / 167
» Simpler and better approximation algorithms for network desi...
Sort
View
134
Voted
ICNP
2007
IEEE
15 years 10 months ago
Slotted Scheduled Tag Access in Multi-Reader RFID Systems
Abstract—Radio frequency identification (RFID) is a technology where a reader device can “sense” the presence of a closeby object by reading a tag device attached to the obj...
Zongheng Zhou, Himanshu Gupta, Samir R. Das, Xianj...
EUROMICRO
2007
IEEE
15 years 10 months ago
A Light-Weight Implementation Scheme of the Tree Morphing Protocol for Mobile Multicast Sources
Multicast network services advantageously complement multimedia information and communication technologies, as they open up the realm for highly scalable multicustomer application...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...
164
Voted
IJCNN
2000
IEEE
15 years 8 months ago
Recursive Non Linear Models for On Line Traffic Prediction of VBR MPEG Coded Video Sources
Any performance evaluation of broadband networks requires modeling of the actual network traffic. Since multimedia services and especially MPEG coded video streams are expected to...
Anastasios D. Doulamis, Nikolaos D. Doulamis, Stef...
ICTAI
1997
IEEE
15 years 7 months ago
GA-Based Performance Analysis of Network Protocols
This paper tackles the problem of analyzing the correctness and performance of a computer network protocol. Given the complexity of the problem, no currently used technique is abl...
Mario Baldi, Fulvio Corno, Maurizio Rebaudengo, Gi...
SENSYS
2006
ACM
15 years 10 months ago
Target tracking with binary proximity sensors: fundamental limits, minimal descriptions, and algorithms
We explore fundamental performance limits of tracking a target in a two-dimensional field of binary proximity sensors, and design algorithms that attain those limits. In particul...
Nisheeth Shrivastava, Raghuraman Mudumbai, Upamany...