Sciweavers

1840 search results - page 301 / 368
» The Capacity of String-Duplication Systems
Sort
View
WCE
2008
13 years 9 months ago
IEEE 802.11E Block Acknowledgement Policies
Optimisation of IEEE 802.11e MAC protocol performance can be performed by modifying several parameters left open in the standard, like buffer size and acknowledgement policies. In ...
Orlando Cabral, Alberto Segarra, Fernando J. Velez
ERSA
2006
70views Hardware» more  ERSA 2006»
13 years 9 months ago
Differential Reconfiguration Architecture suitable for a Holographic Memory
Optically Reconfigurable Gate Arrays (ORGAs), by exploiting the large storage capacity of holographic memory, offer the possibility of providing a virtual gate count that is much l...
Minoru Watanabe, Mototsugu Miyano, Fuminori Kobaya...
ICWN
2003
13 years 9 months ago
Comparison of Heuristic and Optimal Subcarrier Assignment Algorithms
Wireless multi carrier approaches can support the simultaneous transmissions to several wireless terminals, each one getting only some of the available subcarriers. Judiciously ass...
James Gross, Holger Karl, Frank H. P. Fitzek, Adam...
AAAI
2000
13 years 9 months ago
Collective Intelligence and Braess' Paradox
We consider the use of multi-agent systems to control network routing. Conventional approaches to this task are based on Ideal Shortest Path routing Algorithm (ISPA), under which ...
Kagan Tumer, David Wolpert
IJCAI
1997
13 years 9 months ago
Mental Tracking: A Computational Model of Spatial Development
Psychological experiments on children's development of spatial knowledge suggest experience at self-locomotion with visual tracking as important factors. Yet, the mechanism u...
Kazuo Hiraki, Akio Sashima, Steven Phillips