• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,119
Next 10 →

Edge Node Calculations using Potential

by unknown authors
"... rising space of analysis within the communication network world. MANET may be a group of wireless mobile nodes dynamically establishing a brief live network with none use of network infrastructure or centralized administration. Additionally to the high degree of quality, MANET nodes square measure d ..."
Abstract - Add to MetaCart
to be in such the way that it'll use the remaining battery power in associate economical thanks to increase the life time of the network. In this paper we proposed Edge Node Calculations (ENC) for optimized link state routing protocol (OLSR) using Potential calculations in MANET. This concept provides better

Performance Analysis of OBS Edge Nodes for Video Streaming

by Felix Espina, Mikel Izal, Daniel Morató, Eduardo Magaña
"... Abstract—OBS networks offer a highly efficient transport infrastructure for bursty data traffic. Video streaming content distribution networks are a clear candidate to use this promising technology. Traffic injected into an OBS network is a burst arrival process whose characteristics depend not only ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
not only on input traffic parameters but also on design parameters of the OBS network. The properties of this traffic will dictate how it is affected by transmision over the OBS core and thus the user-perceived quality of the video stream that is delivered at the edge of the network. This paper evaluates

Measuring IP and TCP behavior on a Edge Node

by M. Mellia, A. Carpani, R. Lo Cigno - In Proc. IEEE Globecom 2002 , 2002
"... This paper presents Tstat [1], a new tool for the collection and statistical analysis of TCP/IP traffic, able to infer TCP connection status from trace data. Discussing its use, we present some of the performance figures that can be obtained and the insight that such figures can give on TCP/IP proto ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
This paper presents Tstat [1], a new tool for the collection and statistical analysis of TCP/IP traffic, able to infer TCP connection status from trace data. Discussing its use, we present some of the performance figures that can be obtained and the insight that such figures can give on TCP/IP protocols and the Internet.

Performance model for a lossless edge node of OBS networks

by Guoqiang Hu - Proc. Globecom 2006 , 2006
"... In this paper, the performance model for a lossless OBS edge node is built with respect to the queueing performance of the transmission buer. In contrast to the shaping eect of the burst assembly in the buerless edge node, in a lossless edge node the \burstifying " eect of the assembly is more ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
In this paper, the performance model for a lossless OBS edge node is built with respect to the queueing performance of the transmission buer. In contrast to the shaping eect of the burst assembly in the buerless edge node, in a lossless edge node the \burstifying " eect of the assembly is more

Semantic similarity based on corpus statistics and lexical taxonomy

by Jay J. Jiang, David W. Conrath - Proc of 10th International Conference on Research in Computational Linguistics, ROCLING’97 , 1997
"... This paper presents a new approach for measuring semantic similarity/distance between words and concepts. It combines a lexical taxonomy structure with corpus statistical information so that the semantic distance between nodes in the semantic space constructed by the taxonomy can be better quantifie ..."
Abstract - Cited by 873 (0 self) - Add to MetaCart
quantified with the computational evidence derived from a distributional analysis of corpus data. Specifically, the proposed measure is a combined approach that inherits the edge-based approach of the edge counting scheme, which is then enhanced by the node-based approach of the information content

How bad is selfish routing?

by Tim Roughgarden, Éva Tardos - JOURNAL OF THE ACM , 2002
"... We consider the problem of routing traffic to optimize the performance of a congested network. We are given a network, a rate of traffic between each pair of nodes, and a latency function for each edge specifying the time needed to traverse the edge given its congestion; the objective is to route t ..."
Abstract - Cited by 657 (27 self) - Add to MetaCart
We consider the problem of routing traffic to optimize the performance of a congested network. We are given a network, a rate of traffic between each pair of nodes, and a latency function for each edge specifying the time needed to traverse the edge given its congestion; the objective is to route

Goal-directed Requirements Acquisition

by Anne Dardenne , Axel van Lamsweerde, Stephen Fickas - SCIENCE OF COMPUTER PROGRAMMING , 1993
"... Requirements analysis includes a preliminary acquisition step where a global model for the specification of the system and its environment is elaborated. This model, called requirements model, involves concepts that are currently not supported by existing formal specification languages, such as goal ..."
Abstract - Cited by 585 (17 self) - Add to MetaCart
where each node captures an abstraction such as, e.g., goal, action, agent, entity, or event, and where the edges capture semantic links between such abstractions. Well-formedness properties on nodes and links constrain their instances - that is, elements of requirements models. Requirements acquisition

Probabilistic Roadmaps for Path Planning in High-Dimensional Configuration Spaces

by Lydia Kavraki, Petr Svestka, Jean-claude Latombe, Mark Overmars - IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION , 1996
"... A new motion planning method for robots in static workspaces is presented. This method proceeds in two phases: a learning phase and a query phase. In the learning phase, a probabilistic roadmap is constructed and stored as a graph whose nodes correspond to collision-free configurations and whose edg ..."
Abstract - Cited by 1277 (120 self) - Add to MetaCart
edges correspond to feasible paths between these configurations. These paths are computed using a simple and fast local planner. In the query phase, any given start and goal configurations of the robot are connected to two nodes of the roadmap; the roadmap is then searched for a path joining these two

Cooperative strategies and capacity theorems for relay networks

by Gerhard Kramer, Michael Gastpar, Piyush Gupta - IEEE TRANS. INFORM. THEORY , 2005
"... Coding strategies that exploit node cooperation are developed for relay networks. Two basic schemes are studied: the relays decode-and-forward the source message to the destination, or they compress-and-forward their channel outputs to the destination. The decode-and-forward scheme is a variant of ..."
Abstract - Cited by 739 (19 self) - Add to MetaCart
Coding strategies that exploit node cooperation are developed for relay networks. Two basic schemes are studied: the relays decode-and-forward the source message to the destination, or they compress-and-forward their channel outputs to the destination. The decode-and-forward scheme is a variant

Graphs over Time: Densification Laws, Shrinking Diameters and Possible Explanations

by Jure Leskovec, Jon Kleinberg, Christos Faloutsos , 2005
"... How do real graphs evolve over time? What are “normal” growth patterns in social, technological, and information networks? Many studies have discovered patterns in static graphs, identifying properties in a single snapshot of a large network, or in a very small number of snapshots; these include hea ..."
Abstract - Cited by 541 (48 self) - Add to MetaCart
, and we observe some surprising phenomena. First, most of these graphs densify over time, with the number of edges growing superlinearly in the number of nodes. Second, the average distance between nodes often shrinks over time, in contrast to the conventional wisdom that such distance parameters should
Next 10 →
Results 1 - 10 of 7,119
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University