[图书][B] Applications of combinatorial designs to communications, cryptography, and networking

CJ Colbourn, JH Dinitz, DR Stinson - 1999 - Citeseer
Combinatorial designs have long had substantial application in the statistical design of
experiments, and in the theory of error-correcting codes. Applications in experimental and …

Распределенный полный коммутатор как «идеальная» системная сеть для многопроцессорных вычислительных систем

МФ Каравай, ВС Подлазов - Управление большими системами …, 2011 - cyberleninka.ru
Рассматриваются методы построения распределенного полного коммутатора любого
размера, составленного из полных коммутаторов и разветвителей каналов малого …

Incremental learning through graceful degradations in autonomous systems

G Mani, B Bhargava… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Intelligent Autonomous Systems (IAS) are highly cognitive, reflexive, multitasking,
trustworthy (secure and ethical), and rich in knowledge discovery. IAS are deployed in …

CORP: An efficient protocol to prevent data loss in mobile ad-hoc networks

G Mani - 2013 27th International Conference on Advanced …, 2013 - ieeexplore.ieee.org
Data replication increases data availability in Mobile Ad Hoc Networks (MANETs).
Preventing data loss and increasing data availability in MANETs is a nontrivial problem due …

Distributed full switch as an ideal system area network for multiprocessor computers

MF Karavai, VS Podlazov - Automation and Remote Control, 2013 - Springer
Distributed Full Switch as an Ideal System Area Network for Multiprocessor Computers Page 1
ISSN 0005-1179, Automation and Remote Control, 2013, Vol. 74, No. 4, pp. 710–724. © …

Deep Learning Based Models for Cognitive Autonomy and Cybersecurity Intelligence in Autonomous Systems

G Mani - 2022 - hammer.purdue.edu
Cognitive autonomy of an autonomous system depends on its cyber module's ability to
comprehend the actions and intent of the applications and services running on that system …

[图书][B] Theoretical aspects of computer science: advanced lectures

GB Khosrovshahi - 2002 - books.google.com
TheFirstSummerSchoolonTheoreticalAspec… attheInstituteforStudiesinTheoreticalPhysics…
(IPM) from July3-10, 2000. Theideaoforganizingasummerschoolwasori… betweenthe? rstandthesecondeditorofthisvolumeinthewin …

Multiple access communications using combinatorial designs

CJ Colbourn - Summer School on Theoretical Aspects of Computer …, 2000 - Springer
In the past century, combinatorial designs have had substantial application in the statistical
design of experiments and in the theory of error-correcting codes. Applications in …

Algorithmic ADC for use in ASIC design

K Deevy - Euro ASIC'91, 1991 - computer.org
Data replication increases data availability in Mobile Ad Hoc Networks (MANETs).
Preventing data loss and increasing data availability in MANETs is a nontrivial problem due …

[PDF][PDF] PC-Grade Parallel Processing and Hardware Acceleration for Large-Scale Data Analysis

Y Su - 2009 - core.ac.uk
Arguably, modern graphics processing units (GPU) are the first commodity, and desktop
parallel processor. Although GPU programming was originated from the interactive …