Search results
Jump to navigation
Jump to search
- ...gment protection''' is a type of backup technique that can be used in most networks. It can be implemented as a dedicated backup or as a shared backup protecti [[File:Working path segment protection.gif|thumb|300px|right|Working path]] ...9 KB (1,360 words) - 05:56, 31 July 2024
- ...ee problem. A common example of this cost-tree problems are the irrigation networks. The irrigation ditch is represented by a graph, its nodes are water users, [[File:Example of irrigation game.png]] ...5 KB (776 words) - 16:09, 3 December 2024
- ...network models''' are iterative algorithms for creating [[Complex network|networks]] which are able to reproduce the unique properties of the [[Scale-free net The hierarchical network model is part of the scale-free model family sharing their main property of having proportionally more hubs among the nodes than ...9 KB (1,302 words) - 04:30, 26 March 2024
- ...irst2=Naresh M. |last2=Patel |title=Performance Modelling of Communication Networks and Computer Architectures |publisher=Addison–Wesley |date=1992 |page=173}} {{block indent|1=[[File:Mmc-statespace.svg]]}} ...15 KB (2,316 words) - 15:59, 20 December 2023
- ...in complement with the classical networks as it provides an interface for sharing a P2P secret key without public keys for data encryption, which is not vuln [[File:CHSH Game Illustration.png|center|frame|CHSH Game Illustration<ref name=":0 ...4 KB (690 words) - 12:16, 17 February 2025
- ...unconditional sender and recipient untraceability. Anonymous communication networks based on this problem are often referred to as '''DC-nets''' (where DC stan [[File:Dining Cryptographers.svg|thumb|Dining cryptographers problem illustration| ...16 KB (2,357 words) - 18:15, 8 May 2024
- ...30 | year = 2005 | s2cid = 121190780 }}</ref> and to model high speed data networks.<ref name="kulkarni">{{cite book|chapter=Fluid models for single buffer sys ...first4 = M. | title = Analysis of resource transfers in peer-to-peer file sharing applications using fluid models | doi = 10.1016/j.peva.2005.01.001 | journa ...23 KB (3,067 words) - 20:40, 22 November 2023
- [[File:Network-design-poa.svg|thumb|right|A network design game with <math>\Omega( [[File:Network-design-pos.svg|thumb|right|Pathological Price of Stability game]] ...8 KB (1,284 words) - 07:01, 21 October 2023
- {{Short description|BitTorrent-related file format}} {{About|the file format|media piracy using torrent files|Copyright infringement#Peer-to-peer ...18 KB (2,738 words) - 18:13, 3 January 2025
- {{short description|Type of kernel induced by artificial neural networks}} ...l]] that describes the evolution of [[Deep learning|deep artificial neural networks]] during their training by [[gradient descent]]. It allows ANNs to be studi ...35 KB (5,324 words) - 03:32, 5 October 2024
- ...ame="haenggi2012stochastic">M. Haenggi. ''Stochastic geometry for wireless networks''. Cambridge University Press, 2012.</ref> ...kherjee2014">S. Mukherjee. ''Analytical Modeling of Heterogeneous Cellular Networks: Geometry, Coverage, and Capacity''. Cambridge University Press, 2014.</ref ...59 KB (8,607 words) - 07:51, 16 February 2025
- [[File:Tm block.png|thumb|433x433px|A simple block diagram of the Tsetlin machine] ...r.uia.no/milestones-and-discoveries/the-tsetlin-machine-outperforms-neural-networks/|access-date=2018-05-03|website=cair.uia.no}}</ref><ref>{{Cite web|last=Øyv ...30 KB (4,037 words) - 00:23, 15 February 2025
- .... They represent situations which commonly occur in roads, [[communication networks]], [[oligopoly]] markets and [[Habitat|natural habitats]]. There is a set o [[File:Congestion-diagram.svg|thumb|right|300px|The directed graph for a simple co ...51 KB (7,801 words) - 16:08, 18 February 2025
- ...-training-program-in-rwanda/|title=Diffusion of Technologies within Social Networks: Evidence from a Coffee Training Program in Rwanda|website=IGC|date=31 Marc [[File:Adjacency matrix for graph.png|thumb|Converting networks into an adjacency matrix]] ...19 KB (2,748 words) - 04:36, 27 December 2023
- ...des), can promote super-ionic conductivity in anion frameworks with corner-sharing connectivity despite the poor screening ability of oxides compared to sulfi | title = Lithium superionic conductors with corner-sharing frameworks ...26 KB (3,444 words) - 04:21, 17 February 2025
- | image = File:1gog.jpg [[File:Active site of Galactose Oxidase.jpg|thumb|350px|right|Active site structur ...18 KB (2,510 words) - 07:24, 23 September 2024
- {{Short description|File system that allows many clients to have access}} ...s operations (create, delete, modify, read, write) on that data. Each data file may be partitioned into several parts called [[Chunk (information)|chunks]] ...62 KB (8,494 words) - 09:35, 29 October 2024
- [[File:35cm image of West Angelas Iron Ore Mine, Australia.tif|thumb|35cm image of ...ation During Melt From Dual-Pol SAR Scenes Using Deep Convolutional Neural Networks: A Case Study[J]. IEEE Transactions on Geoscience and Remote Sensing, 2016, ...18 KB (2,731 words) - 01:08, 13 September 2024
- ...author may wish to rewrite the introduction to better introduce how these networks work and what they are used for. ...d tiles.<ref name="auto1">{{cite book |title=Guide to convolutional neural networks : a practical application to traffic-sign detection and classification |las ...138 KB (19,374 words) - 22:31, 20 February 2025
- [[File:Graphic matroid parity.svg|thumb|upright=1.35|An instance of the matroid pa {{defn|A [[maximum matching]] in a graph is a subset of edges, no two sharing an endpoint, that is as large as possible. It can be formulated as a matroi ...24 KB (3,739 words) - 02:40, 23 December 2024