Sciweavers

5234 search results - page 987 / 1047
» Simulation of Computer Network Attacks
Sort
View
PERCOM
2010
ACM
15 years 6 months ago
Negotiate power and performance in the reality of RFID systems
—Recent years have witnessed the wide adoption of the RFID technology in many important application domains including logistics, inventory, retailing, public transportation, and ...
Xunteng Xu, Lin Gu, Jianping Wang, Guoliang Xing
123
Voted
WCNC
2010
IEEE
15 years 6 months ago
A New LLMS Algorithm for Antenna Array Beamforming
A new adaptive algorithm, called LLMS, which employs an array image factor, IA , sandwiched in between two Least Mean Square (LMS) sections, is proposed for different applications ...
Jalal Abdulsayed Srar, Kah-Seng Chung, Ali Mansour
NCA
2002
IEEE
15 years 2 months ago
Comparison of Algorithmic and Machine Learning Approaches for the Automatic Fitting of Gaussian Peaks
Fitting gaussian peaks to experimental data is important in many disciplines, including nuclear spectroscopy. Nonlinear least squares fitting methods have been in use for a long t...
Radwan E. Abdel-Aal
109
Voted
APSCC
2008
IEEE
15 years 9 months ago
Hop-by-Hop TCP over MANET
In a MANET environment, communication links are unstable due to various reasons. Error rate is higher and bandwidth is smaller than fixed networks. Running conventional TCP protoco...
Yao-Nan Lien, Yi-Fan Yu
146
Voted
ICDCSW
2008
IEEE
15 years 9 months ago
On Feasibility of P2P On-Demand Streaming via Empirical VoD User Behavior Analysis
—In its current art, peer-to-peer streaming solution has been mainly employed in the domain of live event broadcasting. In such a paradigm, users are required to simultaneously p...
Bin Chang, Liang Dai, Yi Cui, Yuan Xue