Sciweavers

1840 search results - page 304 / 368
» The Capacity of String-Duplication Systems
Sort
View
COGSCI
2008
72views more  COGSCI 2008»
13 years 7 months ago
The Tractable Cognition Thesis
The recognition that human minds/brains are finite systems with limited resources for computation has led some researchers to advance the Tractable Cognition thesis: Human cogniti...
Iris van Rooij
CEE
2006
75views more  CEE 2006»
13 years 7 months ago
Survivability and performance optimization of mobile wireless communication networks in the event of base station failure
In this paper, we investigate the survivability of mobile wireless communication networks in the event of base station (BS) failure. A survivable network is modeled as a mathemati...
Kuo-Chung Chu, Frank Yeong-Sung Lin
COMSUR
2006
87views more  COMSUR 2006»
13 years 7 months ago
Handover schemes in satellite networks: State-of-the-art and future research directions
Low Earth Orbit (LEO) satellites will work as an important component in future data communication networks. LEO satellites provide low end-to-end delays and efficient frequency spe...
Pulak K. Chowdhury, Mohammed Atiquzzaman, William ...
CN
2007
105views more  CN 2007»
13 years 7 months ago
Flow-level QoS for a dynamic load of rate adaptive sessions sharing a bottleneck link
We consider the flow-level quality of service (QoS) seen by a dynamic load of rate adaptive sessions sharing a bottleneck link based on fair share bandwidth allocation. This is o...
Steven Weber, Gustavo de Veciana
COMSUR
2007
101views more  COMSUR 2007»
13 years 7 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...