Sciweavers

5234 search results - page 1001 / 1047
» Simulation of Computer Network Attacks
Sort
View
LION
2009
Springer
145views Optimization» more  LION 2009»
15 years 9 months ago
A Variable Neighborhood Descent Search Algorithm for Delay-Constrained Least-Cost Multicast Routing
Abstract. The rapid evolution of real-time multimedia applications requires Quality of Service (QoS) based multicast routing in underlying computer networks. The constrained Steine...
Rong Qu, Ying Xu, Graham Kendall
SAGT
2009
Springer
163views Game Theory» more  SAGT 2009»
15 years 9 months ago
Nash Equilibria and the Price of Anarchy for Flows over Time
We study Nash equilibria and the price of anarchy in the context of flows over time. Many results on static routing games have been obtained over the last ten years. In flows ov...
Ronald Koch, Martin Skutella
CISS
2008
IEEE
15 years 9 months ago
Distributed detection in the presence of frequency offset and phase shift
— In this paper, we study the problem of distributed detection in the presence of unknown carrier frequency offset (CFO) and initial phase, the issue we encounter in the emerging...
Tao Wu, Qi Cheng
HICSS
2008
IEEE
158views Biometrics» more  HICSS 2008»
15 years 9 months ago
Consensual Dynamics in Group Decision Making with Triangular Fuzzy Numbers
In this paper we study the modelling of consensus reaching in a ‘soft’ environment, i.e. when the individual testimonies are expressed as fuzzy preference relations. Here cons...
Mario Fedrizzi, Michele Fedrizzi, Ricardo A. Marqu...
ICASSP
2008
IEEE
15 years 9 months ago
Bayesian update of dialogue state for robust dialogue systems
This paper presents a new framework for accumulating beliefs in spoken dialogue systems. The technique is based on updating a Bayesian Network that represents the underlying state...
Blaise Thomson, Jost Schatzmann, Steve Young
« Prev « First page 1001 / 1047 Last » Next »