Sciweavers

1242 search results - page 245 / 249
» The Theory of Grammar Constraints
Sort
View
JSAC
2007
97views more  JSAC 2007»
13 years 7 months ago
R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming
— In information theory, it has been shown that network coding can effectively improve the throughput of multicast communication sessions in directed acyclic graphs. More practic...
Mea Wang, Baochun Li
CCR
2000
96views more  CCR 2000»
13 years 7 months ago
Decentralized optimal traffic engineering in the internet
Distributed optimal traffic engineering in the presence of multiple paths has been found to be a difficult problem to solve. In this paper, we introduce a new approach in an attem...
Constantino M. Lagoa, Hao Che
INFOCOM
2010
IEEE
13 years 5 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
INFORMS
2010
138views more  INFORMS 2010»
13 years 5 months ago
Pruning Moves
The concept of dominance among nodes of a branch-decision tree, although known since a long time, is not exploited by general-purpose Mixed-Integer Linear Programming (MILP) enume...
Matteo Fischetti, Domenico Salvagnin
ISF
2010
109views more  ISF 2010»
13 years 5 months ago
Collaborative systems development in disaster relief: The impact of multi-level governance
Disaster management information systems for international humanitarian relief are developed in contexts involving local, national and inter-governmental organizations together with...
Edgar A. Maldonado, Carleen F. Maitland, Andrea Ho...