نتایج جستجو برای: hidden node problem
تعداد نتایج: 1081759 فیلتر نتایج به سال:
Data describing networks—such as communication networks, transaction networks, disease transmission networks, collaboration networks, etc.—is becoming increasingly available. While observational data can be useful, it often only hints at the actual underlying process that governs interactions and attributes. For example, an email communication network provides insight into its users and their r...
A critical problem faced by feedback-merger mechanisms is the lack of information that is discarded due to the hidden nodes in multicast trees. A node is said to be hidden from another if it is located in a sub tree that is a result from a fork in any upstream node. We propose in this paper the virtual layering scheme to avoid the problem caused by hiddennodes in multi-layered multicast video e...
Multiple Instance Learning (MIL) algorithms are designed for problems where labels are available for groups of instances, commonly referred to as bags. In this paper, we consider a new MIL problem setting where instances in a bag are not exchangeable, and a bijection exists between every pair of bags. We propose a neural network based MIL algorithm (MILOrd) that leverages the existence of such ...
Graphical model selection refers to the problem of estimating the unknown graph structure given observations at the nodes in the model. We consider a challenging instance of this problem when some of the nodes are latent or hidden. We characterize conditions for tractable graph estimation and develop efficient methods with provable guarantees. We consider the class of Ising models Markov on loc...
We present our current work-in-progress on the design and implementation of a hybrid TDMA/CSMA medium access architecture, hereafter referred to as hMAC, which can be used on top of commercial IEEE 802.11 off-the-shelf hardware. The software only solution is based on the popular Linux ATH9K softMAC driver and hence can be used with standard Linux systems using Atheros based wireless network dev...
Interference-Aware Hybrid MAC protocol for Cognitive Radio Ad-Hoc Networks with Directional Antennas
CR and PU hidden terminals in multi-channel Cognitive MAC protocols result in increased packet drops. This is due to inefficient node synchronization with existing “Control Channel” design. To date, In-band and Out-of-band CCC based MAC protocols are proposed to avoid PU and CR hidden terminals. But, In-band CCC based CR-MAC protocols cannot efficiently resolve the hidden terminal packet drops ...
In this work lexical choice in generation for Machine Translation is explored using lexical semantics. We address this problem by replacing lemmas with synonyms in the abstract representations that are used as input for generation, given a WordNet synset. In order to find the correct lemma for each node we propose to map dependency trees to Hidden Markov Trees that describe the probability of a...
Cancer is a multi-stage process resulting from accumulation of genetic mutations. Data obtained from assaying a tumor only contains the set of mutations in the tumor and lacks information about their temporal order. Learning the chronological order of the genetic mutations is an important step towards understanding the disease. The probability of introduction of a mutation to a tumor increases ...
According to conventional neural network theories, the feature of single-hidden-layer feedforward neural networks(SLFNs) resorts to parameters of the weighted connections and hidden nodes. SLFNs are universal approximators when at least the parameters of the networks including hidden-node parameter and output weight are exist. Unlike above neural network theories, this paper indicates that in o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید