Sciweavers

31 search results - page 5 / 7
» Systematic Performance Evaluation of Multipoint Protocols
Sort
View
BMCBI
2005
89views more  BMCBI 2005»
13 years 6 months ago
An empirical analysis of training protocols for probabilistic gene finders
Background: Generalized hidden Markov models (GHMMs) appear to be approaching acceptance as a de facto standard for state-of-the-art ab initio gene finding, as evidenced by the re...
William H. Majoros, Steven Salzberg
PERCOM
2005
ACM
14 years 6 months ago
When Does Opportunistic Routing Make Sense?
Different opportunistic routing protocols have been proposed recently for routing in sensor networks. These protocols exploit the redundancy among nodes by using a node that is av...
Adam Wolisz, Jan M. Rabaey, Rahul C. Shah, Sven Wi...
HICSS
2009
IEEE
116views Biometrics» more  HICSS 2009»
14 years 1 months ago
Systems Modeling for IP-Based Handoff Using Timed Petri Nets
The mechanisms and design principles needed for achieving optimized handoff for mobile Internet services are poorly understood and need better analysis. This paper contributes to ...
Ashutosh Dutta, Bryan Lyles, Henning Schulzrinne, ...
ICCTA
2007
IEEE
14 years 1 months ago
On the Link Excess Life in Mobile Wireless Networks
In this paper, one of the most important parameters in performance evaluation and protocol design of wireless networks, Link Excess Life (LEL), is investigated. An analytical mode...
Abbas Nayebi, A. Khosravi, Hamid Sarbazi-Azad
SENSYS
2003
ACM
14 years 4 days ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin