Sciweavers

112 search results - page 13 / 23
» Test of spike-sorting algorithms on the basis of simulated n...
Sort
View
MOBIHOC
2008
ACM
14 years 7 months ago
Finding popular categories for RFID tags
As RFID tags are increasingly attached to everyday items, it quickly becomes impractical to collect data from every tag in order to extract useful information. In this paper, we c...
Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhen Mao
PHSN
1996
13 years 8 months ago
Fully reliable multicast in heterogeneous environments
Multicast (1:N) is now supported by a number of networks and communication protocols. A problem in this context is how to provide fully reliable data transmission to the receiver ...
José Ferreira de Rezende, Andreas Mauthe, S...
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 1 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...

Lecture Notes
742views
15 years 5 months ago
Computer Systems Analysis
Comparing systems using measurement, simulation, and queueing models. Common mistakes and how to avoid them, selection of techniques and metrics, art of data presentation, summariz...
Raj Jain
MOBICOM
2006
ACM
14 years 1 months ago
Status packet deprecation and store-forward routing in AUSNet
AUSNet is a functional network of autonomous undersea vehicles. We present two novel algorithms to enhance AUSNet. In live inwater testing, a packet queueing problem in which stal...
Matthew M. Haag, Emmanuel Agu, Rick Komerska, Stev...