Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Nodes-Protocol'
Nodes-Protocol published presentations and documents on DocSlides.
Dynamics of networks Jure
by beatever
Leskovec. Computer Science Department. Cornell Uni...
Overview of this week Debugging tips for ML algorithms
by bitechmu
Graph algorithms . A prototypical graph algorithm:...
Scaling Out Key-Value Storage
by reimbursevolkswagon
COS 418: . Distributed Systems. Logan Stafman. [Ad...
Graphs and Social Networks
by rouperli
Why Social Graphs Are Different. Communities. Find...
Chapter 3 Heuristic Search
by criticanime
Continued. Before We Start. HW1 extended to Monday...
Lecture 6A – Introduction to Trees & Optimality Criteria
by goldengirl
Branches: . n. -taxa -> 2. n. -3 branches. . 1...
Lymphatic System Mareline
by laobeast
Mercado. What is the . lyphatic. system ?. A comp...
Brea st cancer G eneral
by slayrboot
. in. f. orma. t. ion. Risk. . f. a. ct. ors. Pro...
CC5212-1 Procesamiento
by loaiatdog
Masivo. de . Datos. Otoño. . 2018. Lecture . 8....
Performance Investigation and Optimization of IEEE802.15.4 for
by myesha-ticknor
Industrial Wireless . Sensor Networks. Mohsin. H...
Automatic Extraction of Malicious Behaviors
by yoshiko-marsland
Khanh-Huu-The Dam. University Paris Diderot and L...
Data Structure & Algorithms in JAVA
by giovanna-bartolotta
Data Structure & Algorithms in JAVA 5 th edi...
Algorithmic and Economic Aspects of Networks
by phoebe-click
Algorithmic and Economic Aspects of Networks Nico...
DriveScale End User Sales Presentation
by min-jolicoeur
DriveScale End User Sales Presentation April 24, ...
Graph Algorithms Adapted from UMD Jimmy Lin’s slides, which
by pamella-moone
Graph Algorithms Adapted from UMD Jimmy Lin’s s...
Online Social Networks and Media
by alexa-scheidler
Network Ties. How simple processes at the level ...
Chapter 9 Shortest Paths and
by briana-ranney
Discrete Dynamic Programming. Example 9.1 . Littl...
Chapter 3 Heuristic Search
by luanne-stotts
Continued. Before we continue. Breadth-First. Dep...
Friendship Selection in the Social Internet of Things: Challenges and Possible Strategies
by tatyana-admore
Presented by Chen, Guo, Sistrunk, and Southward. ...
Graphs and Social Networks
by lindy-dunigan
Why Social Graphs Are Different. Communities. Com...
Outline Introducing perfect binary trees
by celsa-spraggs
Definitions and examples. Number of nodes: . 2. ...
D* Lite and Dynamic pathfinding
by yoshiko-marsland
Adrian Sotelo. CS582. Spring 2009 Digipen Institu...
David Stotts Computer Science Department
by mitsue-stanley
UNC Chapel . Hill. Data Structures . and Analysis...
CSCI 104 2-3-4 Trees and Red/Black Trees
by test
Mark Redekopp. David Kempe. Definition. 2-3-4 tre...
Welcome to Kamiak 10/2/2017 Training Session
by trish-goza
Aurora Clark, CIRC Director. Peter Mills, Computa...
Programming Abstractions
by tatiana-dople
Cynthia Lee. CS106X. Graphs Topics. Graphs!. Basi...
Dynamo: Amazon’s Highly Available Key-value Store
by alexa-scheidler
Giuseppe DeCandia, Deniz Hastorun,. Madan Jampan...
HW5 What’s a quorum? A fraction of nodes in the system
by tatiana-dople
How can we use the concept of quorum?. If we know...
Route Optimization Problems and Google Maps
by sherrill-nordquist
Will Cranford. Abstract. Abstract: The focus of t...
Lecture 26: Information diffusion
by lindy-dunigan
CS 765 Complex Networks. Slides are modified from...
The R -Tree: A Dynamic Index
by giovanna-bartolotta
for Multi-Dimensional . Objects. Timos. . Sellis...
Uninformed Search CS171,
by tatiana-dople
Winter 2018. Introduction to Artificial Intellige...
Ralucca Gera, Naval Postgraduate School
by ellena-manuel
Monterey, California. rgera@nps.edu. Overview of....
Clock Synchronization in Sensor Networks for Civil Security
by olivia-moreira
Farnaz. . Moradi. . Asrin. . Javaher...
Bo Zong , Yinghui Wu, Ambuj K. Singh,
by olivia-moreira
Xifeng Yan. 1. Inferring the Underlying Structure...
SECURITY IN SENSOR NETWORKS
by min-jolicoeur
BY. SASIKIRAN V.L. REDDY. STUDENT NO....
Constraint Satisfaction Problems (CSPs)
by min-jolicoeur
Introduction and Backtracking Search. This lectur...
Query-based Graph Cuboid
by myesha-ticknor
Outlier Detection. Ayushi Dalmia. *. , Manish Gup...
Evaluation of OSS Node-Based Assimilation
by celsa-spraggs
Alan . Lipton, . Jean-Luc Moncet, Pan Liang. Atmo...
Hijacking Bitcoin: Routing attacks on cryptocurrencies
by jane-oiler
Aviv Zohar. School Computer Science and Engineeri...
Load More...