• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,066
Next 10 →

Fibonacci Heaps and Their Uses in Improved Network optimization algorithms

by Michael L. Fredman, Robert Endre Tarjan , 1987
"... In this paper we develop a new data structure for implementing heaps (priority queues). Our structure, Fibonacci heaps (abbreviated F-heaps), extends the binomial queues proposed by Vuillemin and studied further by Brown. F-heaps support arbitrary deletion from an n-item heap in qlogn) amortized tim ..."
Abstract - Cited by 739 (18 self) - Add to MetaCart
In this paper we develop a new data structure for implementing heaps (priority queues). Our structure, Fibonacci heaps (abbreviated F-heaps), extends the binomial queues proposed by Vuillemin and studied further by Brown. F-heaps support arbitrary deletion from an n-item heap in qlogn) amortized

MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks

by John Burgess, Brian Gallagher, David Jensen, Brian Neil Levine - In Proc. IEEE INFOCOM , 2006
"... Abstract — Disruption-tolerant networks (DTNs) attempt to route network messages via intermittently connected nodes. Routing in such environments is difficult because peers have little information about the state of the partitioned network and transfer opportunities between peers are of limited dura ..."
Abstract - Cited by 488 (12 self) - Add to MetaCart
Abstract — Disruption-tolerant networks (DTNs) attempt to route network messages via intermittently connected nodes. Routing in such environments is difficult because peers have little information about the state of the partitioned network and transfer opportunities between peers are of limited

Resource Containers: A New Facility for Resource Management in Server Systems

by Gaurav Banga, Peter Druschel, Jeffrey C. Mogul - In Operating Systems Design and Implementation , 1999
"... General-purpose operating systems provide inadequate support for resource management in large-scale servers. Applications lack sufficient control over scheduling and management of machine resources, which makes it difficult to enforce priority policies, and to provide robust and controlled service. ..."
Abstract - Cited by 498 (10 self) - Add to MetaCart
General-purpose operating systems provide inadequate support for resource management in large-scale servers. Applications lack sufficient control over scheduling and management of machine resources, which makes it difficult to enforce priority policies, and to provide robust and controlled service

RSVP: A New Resource Reservation Protocol

by Lixia Zhang, Stephen Deering, Deborah Estrin, Scott Shenker, et al. , 1993
"... Whe origin of the RSVP protocol can be traced back to 1991, when a team of network researchers, including myself, started playing with a number of packet scheduling algorithms on the DARTNET (DARPA Testbed NETwork), a network testbed made of open source, workstation-based routers. Because scheduling ..."
Abstract - Cited by 1005 (25 self) - Add to MetaCart
Whe origin of the RSVP protocol can be traced back to 1991, when a team of network researchers, including myself, started playing with a number of packet scheduling algorithms on the DARTNET (DARPA Testbed NETwork), a network testbed made of open source, workstation-based routers. Because

Ecology of the family as a context for human development: Research perspectives.

by Urie Bronfenbrenner , Josephine Arastah , Mavis Hetherington , Richard Lerner , Jeylan T Mortimer , Joseph H Pleck , Lea Pulkinnen , Michael Rutter , Klaus Schneewind , Diana Slaughter - Developmental Psychology, , 1986
"... This review collates and examines critically a theoretically convergent but widely dispersed body of research on the influence of external environments on the functioning of families as contexts of human development. Investigations falling within this expanding domain include studies of the interac ..."
Abstract - Cited by 518 (0 self) - Add to MetaCart
of the interaction of genetics and environment in family processes; transitions and linkages between the family and other major settings influencing development, such as hospitals, day care, peer groups, school, social networks, the world of work (both for parents and children), and neighborhoods and communities

Priority Encoding Transmission

by Andres Albanese, Johannes Blömer, Jeff Edmonds, Michael Luby, Madhu Sudan - IEEE Transactions on Information Theory , 1994
"... We introduce a new method, called Priority Encoding Transmission, for sending messages over lossy packet-based networks. When a message is to be transmitted, the user specifies a priority value for each part of the message. Based on the priorities, the system encodes the message into packets for tra ..."
Abstract - Cited by 311 (11 self) - Add to MetaCart
We introduce a new method, called Priority Encoding Transmission, for sending messages over lossy packet-based networks. When a message is to be transmitted, the user specifies a priority value for each part of the message. Based on the priorities, the system encodes the message into packets

Priority Network Access Pricing for Electric Power

by Shi-Jie Deng, Shmuel Oren
"... We propose a priority-pricing scheme for zonal access to the electric power grid that is uniform across all buses in a zone. The Independent System Operator (ISO) charges bulk power traders a per unit ex ante transmission access fee. The zonal access fee serves as an access insurance premium that ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
We propose a priority-pricing scheme for zonal access to the electric power grid that is uniform across all buses in a zone. The Independent System Operator (ISO) charges bulk power traders a per unit ex ante transmission access fee. The zonal access fee serves as an access insurance premium

ESRC priority network ‘Social Contexts and Responses to Risk’

by Of Risk, J. Richard Eiser, Mathew P. White, A Psychological, Eiser White, J. Richard Eiser, Mathew P. White, Eiser White , 2006
"... Over 50 years of cross-disciplinary research suggests we have higher trust in those who are seen as a) knowledgeable, b) similar to ourselves and c) honest/transparent. Doctors are trusted with our medical care because they are perceived to: be competent, share our concerns, and tell us what they th ..."
Abstract - Add to MetaCart
Over 50 years of cross-disciplinary research suggests we have higher trust in those who are seen as a) knowledgeable, b) similar to ourselves and c) honest/transparent. Doctors are trusted with our medical care because they are perceived to: be competent, share our concerns, and tell us what they think. Politicians tend to be distrusted for the opposite reasons. However, we know much less about 'marginal trust', i.e. how trust is built or lost as a result of new information. Many policy makers already know that public trust in them is low. What they now want to know is how to improve this situation. Greater understanding of marginal trust is critical for such change. In its exploration of marginal trust, the current paper draws on four fundamental psychological processes and related empirical evidence. First, in line with a general negativity bias, people tend to trust bad news more than good. Second, in line with the desire for cognitive consistency, people tend to trust news that is congruent with their prior

The Quest for Security in Mobile Ad Hoc Networks

by Jean-Pierre Hubaux, Levente Buttyan , 2001
"... So far, research on mobile ad hoc networks has been focused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overview of security problems for mobile ad hoc networks, distinguishing the threats on basic mechanisms and on security mecha ..."
Abstract - Cited by 348 (12 self) - Add to MetaCart
So far, research on mobile ad hoc networks has been focused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overview of security problems for mobile ad hoc networks, distinguishing the threats on basic mechanisms and on security

D.: Fault tolerant on board networks with priorities. Networks 47(1

by Jean-claude Bermond, C. D. Toth, Hal Id Inria, J. -c. Bermond, F. Havet, Projet Mascotte Cnrs/inria/unsa, C. D. Toth , 2006
"... HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte p ..."
Abstract - Cited by 6 (3 self) - Add to MetaCart
pluridisciplinaire HAL, est destinée au dépôt et a ̀ la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés. Fault tolerant on-board networks with priorities
Next 10 →
Results 1 - 10 of 5,066
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University