Search Results for ''

published presentations and documents on DocSlides.

TechTalk: Node.js Jessica Davis, Juan Herrera, Ian Hoyt-McCullough, Varun Verma
TechTalk: Node.js Jessica Davis, Juan Herrera, Ian Hoyt-McCullough, Varun Verma
by bigboybikers
Overview of Node.js. What is Node.js?. An open-sou...
4.11 Effect of Windows on Throughput
4.11 Effect of Windows on Throughput
by piper
:. When a sender window of size . N. is used, thi...
Hidden Terminal Problem  and
Hidden Terminal Problem and
by patchick
Exposed Terminal Problem. in Wireless MAC Protoco...
Clock Synchronization TexPoint
Clock Synchronization TexPoint
by jane-oiler
fonts used in EMF. . Read the TexPoint manual be...
1 Adam Smith L ECTURES
1 Adam Smith L ECTURES
by conchita-marotz
22-23. Binary Search Trees. Algorithms and Data S...
Activity Networks Charles.DeMatas@sta.uwi.edu
Activity Networks Charles.DeMatas@sta.uwi.edu
by calandra-battersby
1. 2. Activity. Pre-requisites. Time required. α...
Using Alloy to model an algorithm that finds the shortest p
Using Alloy to model an algorithm that finds the shortest p
by min-jolicoeur
Roger L. Costello. December 29, 2016. Acknowledge...
On Anomalous Hot Spot Discovery
On Anomalous Hot Spot Discovery
by lindy-dunigan
in Graph Streams. 2013-12-08. @Dallas. Introducti...
University of Colorado Time Systems
University of Colorado Time Systems
by briana-ranney
Lucas . Buccafusca. Sean DesMarteau. Tanner . Han...
Hidden Terminal Problem
Hidden Terminal Problem
by celsa-spraggs
and . Exposed Terminal Problem. in Wireless MAC...
© 2000  South-Western College Publishing/ITP
© 2000 South-Western College Publishing/ITP
by min-jolicoeur
Slides Prepared by JOHN LOUCKS. Project Managemen...
Mount Rainier Evacuation Plan
Mount Rainier Evacuation Plan
by calandra-battersby
CPT Cardy Moten III, USA. LT . Volkan. . Sozen. ...
Rumors
Rumors
by liane-varnes
, consensus and epidemics on networks. J. . Ganes...
Spontaneous recovery in dynamic networks
Spontaneous recovery in dynamic networks
by briana-ranney
Advisor. :. H. E. Stanley. Collaborators:. B. Po...
Spontaneous recovery and metastability
Spontaneous recovery and metastability
by calandra-battersby
in single and interacting networks. Collaborators...
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model
by edward
Authors: Pedro B. . Velloso. , Rafael P. . Laufer...
Online  Social Networks
Online Social Networks
by esther
and Media . Cascading Behavior in Networks. Epidem...
Opportunistic routing in wireless sensor networks powered
Opportunistic routing in wireless sensor networks powered
by hazel
by ambient . energy harvesting. Z. . Ang. . Eu. ...
7- chapter Seven Local Area Networks (LAN
7- chapter Seven Local Area Networks (LAN
by delilah
). The LANs are a popular group of networks becaus...
Chapter 24: Advanced Indexing
Chapter 24: Advanced Indexing
by arya
Bloom Filters. A . bloom filter. . is a probabili...
Lecture Note  10  Application I – Distributed Computing on Sensor Networks
Lecture Note 10 Application I – Distributed Computing on Sensor Networks
by luna
Cross-Layered Design of Sensor Networks. I. Funda...
Wireless Ad Hoc  Networks
Wireless Ad Hoc Networks
by harper
(. 18ISCNPCWN). Dr. N. Sandeep Varma. Contention B...
Nodejs Helps NASA Keep Astronauts Safe
Nodejs Helps NASA Keep Astronauts Safe
by candy
During a spacewalk in 2013, Italian astronaut Luca...
DesignandEvaluationoftheMonitorNetworkMeasurementServiceonGENIEthanBla
DesignandEvaluationoftheMonitorNetworkMeasurementServiceonGENIEthanBla
by grace3
andimplementedanextensibleyetsafeserviceforhandlin...
Compressing  Backoff  in CSMA Networks
Compressing Backoff in CSMA Networks
by pongre
Mahanth Gowda. University of Illinois (UIUC). Romi...
Introduction to Algorithms
Introduction to Algorithms
by cheryl-pisano
. Graph Algorithms. CSE 680. Prof. Roger Crawfis...
Graph Algorithms Counting Triangles
Graph Algorithms Counting Triangles
by natalia-silvester
Transitive Closure. Jeffrey D. Ullman. Stanford U...
Search Techniques CS480/580
Search Techniques CS480/580
by myesha-ticknor
Fall 2009. Introduction. Trees: . Root, parent, c...
Understanding the Effects and Implications of Compute Node Failures in
Understanding the Effects and Implications of Compute Node Failures in
by briana-ranney
Florin . Dinu. . T. S. Eugene Ng. Com...
Chapter  5:  MACHINATIONS
Chapter 5: MACHINATIONS
by natalia-silvester
Hamzah Asyrani Sulaiman. Machinations is more tha...
Chapter  5:  MACHINATIONS
Chapter 5: MACHINATIONS
by lois-ondreau
Hamzah Asyrani Sulaiman. Machinations is more tha...
Traffic assignment Trip generation
Traffic assignment Trip generation
by giovanna-bartolotta
Trip distribution. Mode split. Transit person tri...
Adding Parallelism to Undergraduate Algorithms
Adding Parallelism to Undergraduate Algorithms
by alida-meadow
Computational Models and Algorithms. RAM model fo...
James C. Davis Eric R. Williamson
James C. Davis Eric R. Williamson
by karlyn-bohler
Dongyoon Lee. A Sense of Time for . JavaScript an...
Under Graduate Project Presentation
Under Graduate Project Presentation
by test
Advisor : Prof. Surender Baswana. - Shivam Taji. ...
Slides by John Loucks St. Edward’s
Slides by John Loucks St. Edward’s
by olivia-moreira
University. Modifications by. A. Asef-Vaziri. Sho...
An Adaptive Energy-Efficient
An Adaptive Energy-Efficient
by yoshiko-marsland
MAC Protocol for . Wireless Sensor Networks. by ....
1 /24 Passive Interference Measurement in Wireless Sensor Networks
1 /24 Passive Interference Measurement in Wireless Sensor Networks
by karlyn-bohler
Shucheng. Liu. 1,2. , . Guoliang Xing. 3. , . Ho...
Review Questions
Review Questions
by luanne-stotts
Complete questions 1, 2, and 3 on your quiz. 1. G...
COMP SCI 5400 – Introduction to
COMP SCI 5400 – Introduction to
by alexa-scheidler
Artificial Intelligence. Dr. Daniel Tauritz (Dr. ...