Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Network topology")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 964

  • Page / 39
Export

Selection :

  • and

A self-stabilizing enumeration algorithmGODARD, Emmanuel.Information processing letters. 2002, Vol 82, Num 6, pp 299-305, issn 0020-0190Article

Effects of different connectivity patterns in a model of cortical circuitsAGUIRRE, Carlos; CAMPOS, Doris; PASCUAL, Pedro et al.Lecture notes in computer science. 2003, pp 78-85, issn 0302-9743, isbn 3-540-40210-1, 8 p.Conference Paper

Structural vulnerability in transmission systems: Cases of Colombia and SpainCORREA, Gabriel J; YUSTA, José M.Energy conversion and management. 2014, Vol 77, pp 408-418, issn 0196-8904, 11 p.Article

Accelerated diffusion algorithms on general dynamic networksBAHI, Jacques; COUTURIER, Raphaël; VERNIER, Flavien et al.Lecture notes in computer science. 2004, pp 77-82, issn 0302-9743, isbn 3-540-21946-3, 6 p.Conference Paper

Influence of network topology on protocol simulationMAGONI, Damien; PANSIOT, Jean-Jacques.Lecture notes in computer science. 2001, issn 0302-9743, isbn 3-540-42302-8, 2Vol, vol 1, 762-770Conference Paper

The Topology of Dark NetworksXU, Jennifer; HSINCHUN CHEN.Communications of the ACM. 2008, Vol 51, Num 10, pp 58-65, issn 0001-0782, 8 p.Article

Online channel allocation in FDMA networks with reuse constraintsFEDER, T; SHENDE, S. M.Information processing letters. 1998, Vol 67, Num 6, pp 295-302, issn 0020-0190Article

Using the vulnerability information of computer systems to improve the network securityLAI, Yeu-Pong; HSIA, Po-Lun.Computer communications. 2007, Vol 30, Num 9, pp 2032-2047, issn 0140-3664, 16 p.Article

On-line scheduling mesh jobs with dependenciesDESHI YE; GUOCHUAN ZHANG.Theoretical computer science. 2007, Vol 372, Num 1, pp 94-102, issn 0304-3975, 9 p.Article

Subtree decomposition for network codingFRAGOULI, Christina; SOLJANIN, Emina.IEEE International Symposium on Information Theory. 2004, isbn 0-7803-8280-3, 1Vol, p. 145Conference Paper

Chordal topologies for interconnection networksBEIVIDE, Ramon; MARTINEZ, Carmen; IZU, Cruz et al.Lecture notes in computer science. 2003, pp 385-392, issn 0302-9743, isbn 3-540-20359-1, 8 p.Conference Paper

Self-stabilizing local mutual exclusion on networks in which process identifiers are not distinctKAKUGAWA, Hirotsugu; YAMASHITA, Masafumi.Proceedings - Symposium on Reliable Distributed Systems. 2002, pp 202-211, issn 1060-9857, isbn 0-7695-1659-9, 10 p.Conference Paper

An improved algorithm of multicast topology inference from end-to-end measurementsTIAN, Hui; SHEN, Hong.Lecture notes in computer science. 2003, pp 376-384, issn 0302-9743, isbn 3-540-20359-1, 9 p.Conference Paper

Profile-based subscriber service provisioningSHEN, F; CLEMM, A.IEEE / IFIP network operations and management symposium. 2002, pp 561-574, isbn 0-7803-7382-0, 14 p.Conference Paper

On bounded load routings for modeling κ-regular connection topologiesKOSOWSKI, Adrian; MALAFIEJSKI, Michał; ZYLINSKI, Paweł et al.Lecture notes in computer science. 2005, pp 614-623, issn 0302-9743, isbn 3-540-30935-7, 1Vol, 10 p.Conference Paper

Topological-order based dynamic polling scheme using routing path for network monitoringBYOUNGWOO YOON; SEONGJIN AHN; JINWOOK CHUNG et al.Lecture notes in computer science. 2003, pp 292-301, issn 0302-9743, isbn 3-540-40456-2, 10 p.Conference Paper

On the spectrum and structure of Internet topology graphsVUKADINOVIC, Danica; HUANG, Polly; ERLEBACH, Thomas et al.Lecture notes in computer science. 2002, pp 83-95, issn 0302-9743, isbn 3-540-43790-8, 13 p.Conference Paper

Diversity-induced resonance in a model for opinion formationTESSONE, C. J; TORAL, R.The European physical journal. B, Condensed matter physics (Print). 2009, Vol 71, Num 4, pp 549-555, issn 1434-6028, 7 p.Article

Characterization of microRNA-regulated protein-protein interaction networkHSU, Chun-Wei; JUAN, Hsueh-Fen; HUANG, Hsuan-Cheng et al.Proteomics (Weinheim. Print). 2008, Vol 8, Num 10, pp 1975-1979, issn 1615-9853, 5 p.Article

Long range action in networks of chaotic elementsBLANK, Michael; BUNIMOVICH, Leonid.Nonlinearity (Bristol. Print). 2006, Vol 19, Num 2, pp 329-344, issn 0951-7715, 16 p.Article

An all-reduce operation in star networks using all-to-all broadcast communication patternOH, Eunseuk; CHOI, Hongsik; PRIMEAUX, David et al.Lecture notes in computer science. 2005, pp 419-426, issn 0302-9743, isbn 3-540-26032-3, 3Vol, 8 p.Conference Paper

Structuring peer-to-peer networks using interest-based communitiesKHAMBATTI, Mujtaba; KYUNG DONG RYU; DASGUPTA, Partha et al.Lecture notes in computer science. 2004, pp 48-63, issn 0302-9743, isbn 3-540-20968-9, 16 p.Conference Paper

A simple test-bed for real-time sensor-to-shooter applications of decentralised data fusionBINNS, L; COOKE, A; FRYERS, S et al.SPIE proceedings series. 2003, pp 371-381, isbn 0-8194-4959-8, 11 p.Conference Paper

A mixed deflection and convergence routing algorithm: Design and performanceBARTH, D; BERTHOME, P; CZARCHOSKI, T et al.Lecture notes in computer science. 2002, pp 767-774, issn 0302-9743, isbn 3-540-44049-6, 8 p.Conference Paper

Impact of noise structure and network topology on tracking speed of neural networksLONGWEN HUANG; YUWEI CUI; DANKE ZHANG et al.Neural networks. 2011, Vol 24, Num 10, pp 1110-1119, issn 0893-6080, 10 p.Article

  • Page / 39