Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
CS 678 –Boltzmann Machines
by giovanna-bartolotta
1. Boltzmann Machine. Relaxation net with visible...
841.11 / ZZ88 Performance
by stefany-barnette
of Parallel Neuronal Models on Triton Cluster. An...
1 EE
by lois-ondreau
122:. Link Layer. Ion Stoica. TAs: . Junda. Liu...
Caching:
by lindy-dunigan
How It Works and When You Should Use It . Shy Coh...
Corporate Valuation and Financing
by alida-meadow
Exercises Session 5 . « Risky Debt, Convertible...
Online Social Networks and Media
by alexa-scheidler
Betweenness. and Graph partitioning. Chapter 3, ...
Kinodynamic
by tatyana-admore
. RRTs. with . Fixed Time Step . and Best-Input ...
Presented by:
by celsa-spraggs
Priyank Gupta. 04/02/2012. Generic Low Latency . ...
Graphs-Part II
by lindy-dunigan
Depth First Search (DFS). We Already Covered . Br...
CROWN “Thales” project
by debby-jeon
Optimal . ContRol. of self-Organized Wireless Ne...
CSC774 - NCSU ADVANCED NE
by cheryl-pisano
Mitigation of Primary User. Emulation Attack . ...
Epidemics
by test
Fundamental . terms. Diseases . vs. Diseases tra...
Sensors Everywhere
by conchita-marotz
Panos Pardalos. Distinguished Professor. Center f...
‘s Overload Tolerant Design Exacerba
by tatiana-dople
Florin Dinu T. S. Eugene Ng. Rice U...
Distributed Maintenance of Cache Freshness in Opportunistic
by danika-pritchard
Wei Gao and Guohong Cao. Dept. of Computer Scienc...
The Problem of Reconstructing k-articulated Phylogenetic Ne
by faustina-dinatale
Supervisor. : . Dr. . Yiu. . Siu. Ming. Second ...
CS 253:
by min-jolicoeur
Algorithms. Chapter 6. Heapsort. Appendix B.5. Cr...
Algorithmic and Economic Aspects of Networks
by natalia-silvester
Nicole Immorlica. Diffusion through Networks. How...
1 Monte-Carlo Tree Search
by lindy-dunigan
Alan Fern . 2. Introduction. Rollout does not gua...
From Overlays to Clouds:
by conchita-marotz
Inventing a New Network Paradigm. D. istributed ....
The Feasibility of Launching and Detecting Jamming Attacks
by stefany-barnette
Authors: . Wenyuan. XU, Wade Trappe, . Yanyong. ...
Von Neuman
by celsa-spraggs
(Min-Max theorem). Claude Shannon. (finite look-a...
Improvement on LEACH Protocol of Wireless Sensor Network
by sherrill-nordquist
Multihop. . LEACH. Energy LEACH. 1. Abstract. E....
Dictionary Matching
by tatyana-admore
with One Gap. Amihood. Amir, . Avivit. . Levy, ...
Graph Algorithms for Modern Data Models
by alida-meadow
Ashish Goel. Stanford University. Joint work with...
Read Alignment Algorithms
by lois-ondreau
The Problem. 2. Given a very long reference seque...
Towards large-scale parallel simulated
by jane-oiler
packings. of ellipsoids with . OpenMP. and Hype...
Parsing Techniques
by trish-goza
A Practical Guide. by . Dick Grune and. Ceriel. ...
Finding the Optimal Strategies in Robotic Patrolling with A
by lois-ondreau
Francesco Amigoni, Nicola Basilico, Nicola Gatti....
On Heterogeneous Neighbor Discovery in Wireless Sensor Netw
by briana-ranney
Lin Chen. †. ♠. , . Ruolin Fan. ∗. , . Kaig...
Binary Search Trees
by lois-ondreau
CIS 606. Spring 2010. Search trees. Data structur...
TEEN: A Routing Protocol for Enhanced Efficiency in Wireles
by lindy-dunigan
By . M. JAFFAR KHAN. SP11-REE-029. 1. Abstract. C...
Data Structures
by alida-meadow
and. Algorithms. Course slides: Radix Search, Rad...
ROUTING IN
by calandra-battersby
VANETs. SAMEERA SIDDIQUI. PhD STUDENT. UNIVERSITY...
QoS Performance Analysis
by conchita-marotz
for. CSMA/CA in IEEE802.15.5. Yon Lan, Bo Zhang a...
Towards a Widely Applicable SINR Model for Wireless Access
by marina-yarberry
Christian Scheideler. University of . Paderborn. ...
Binary Search Trees
by jane-oiler
CS 46101 Section 600. CS 56101 Section 002. . Dr...
Challenge the long tail recommendation
by lindy-dunigan
Hongzhi. Yin. , Bin Cui, Jing Li, . Junjie. Yao...
Distributed Authentication in Wireless Mesh Networks Throug
by marina-yarberry
draft-moustafa-krb-wg-mesh-nw-00.txt. Hassnaa Mou...
Indexing Trajectory Data
by alexa-scheidler
--Presented By . Sudheer. . Chelluboina. .. Prof...
Load More...