Search results
Jump to navigation
Jump to search
- ...o nodes in a wireless packet data network. It is widely utilized in [[mesh networking]] [[algorithm]]s. ...co Meraki|Meraki]] and [[Optimized Link State Routing Protocol|OLSR]] mesh networking protocols, among others. ...2 KB (329 words) - 14:31, 6 December 2024
- ...tributed flooding algorithm]] that can be implemented as a [[Broadcasting (networking)|broadcast]] protocol in [[Synchronous network|synchronous]] distributed ne ...m |pages=183–199 |language=en |chapter=Stateless Information Dissemination Algorithms |doi=10.1007/978-3-030-54921-3_11 |editor2-last=Scheideler |editor2-first=C ...6 KB (884 words) - 20:20, 28 July 2024
- {{Short description|Networking hardware company}} |industry = [[Networking hardware]] ...6 KB (755 words) - 17:06, 25 July 2024
- ...last3=Kipnis|first3=Shlomo|last4=Weathersby|first4=Derrick|title=Efficient Algorithms for All-to-All Communications in Multiport Message-Passing Systems|journal= ...ication pattern)|hypercube]], [[Ring network|ring]]), different all-to-all algorithms are required. ...7 KB (1,067 words) - 05:46, 31 December 2023
- ...sm''' is a network growth [[algorithm]], which randomly places new [[Node (networking)|node]]s in the system, and connects them to the existing nodes based on a [[Category:Routing algorithms]] ...4 KB (700 words) - 13:22, 30 July 2024
- * Request messages sent to all [[Node (networking)|nodes]] [[Category:Distributed algorithms]] ...5 KB (760 words) - 09:46, 30 April 2024
- ...' or '''23-broadcast''') is an algorithm that implements a [[Broadcasting (networking)|broadcast]] communication pattern on a [[Distributed computing|distributed == Comparison to similar algorithms == ...16 KB (2,421 words) - 09:11, 11 January 2024
- ...ctors that will determine what shows up on a [[newsfeed]] or [[timeline]]. Algorithms, for example, are a type of factor that can alter the reach of a post due t ...=Is the Time and Effort Worth It? One Library's Evaluation of Using Social Networking Tools for Outreach|journal=Medical Reference Services Quarterly|volume=32|i ...11 KB (1,773 words) - 21:05, 5 November 2024
- ...nd Cross-Layer Control in Wireless Networks]," ''Foundations and Trends in Networking'', vol. 1, no. 1, pp. 1-149, 2006.</ref><ref name = sno-text>M. J. Neely. ' ...hile minimizing the time average of the penalty <math>p(t),</math> network algorithms can be designed to make control actions that greedily minimize a bound on t ...13 KB (2,097 words) - 09:04, 28 February 2023
- ===Algorithms=== ...quality of protection in optical/mpls networks,”Optical Switching and Networking, vol. 1, pp.19–33, January 2005.</ref><ref name=Tornatore>Tornatore. M, Car ...9 KB (1,360 words) - 05:56, 31 July 2024
- '''Communication-avoiding algorithms''' minimize movement of data within a [[memory hierarchy]] for improving it A common computational model in analyzing communication-avoiding algorithms is the two-level memory model: ...13 KB (1,863 words) - 21:54, 17 April 2024
- ...s | last2=Chen | first2=Wei | last3=Toueg | first3=Sam | title=Distributed Algorithms | chapter=Heartbeat: A timeout-free failure detector for quiescent reliable ...s are sent in a periodic manner through techniques such as [[Broadcasting (networking)|broadcast]] or [[multicast]]s in larger clusters.{{sfn|Robertson|2000|p=2} ...10 KB (1,502 words) - 00:21, 17 October 2024
- {{Short description|Algorithms to produce pseudo-random numbers}} Such algorithms are inherently ''sequential'' and not amenable to running on parallel machi ...7 KB (974 words) - 06:15, 19 January 2024
- | conference = Proc. 10th ACM International on Conference on Emerging Networking Experiments and Technologies (CoNEXT '14) ...10.1007/3-540-44676-1_10 | title = Proc. 9th Annual European Symposium on Algorithms (ESA 2001) | series = Lecture Notes in Computer Science | volume = 2161 | p ...7 KB (1,077 words) - 23:05, 28 July 2024
- ...Data Stream Summary: The Count-Min Sketch and its Applications |journal=J. Algorithms |year=2005 |volume=55 |pages=29–38 |url=http://dimacs.rutgers.edu/~graham/p | journal = IEEE/ACM Transactions on Networking ...10 KB (1,527 words) - 09:42, 17 November 2024
- ...In addition, Brandes' algorithm improves on the space complexity of naive algorithms, which typically require <math>O(|V|^2)</math> space. Brandes' algorithm on [[Category:Graph algorithms]] ...12 KB (1,740 words) - 20:54, 12 October 2024
- There exists algorithms for perfect simulation of the general restricted random waypoint. They are [[Category:Wireless networking]] ...6 KB (926 words) - 02:15, 5 May 2024
- ...lisher = [[ IETF]]}}</ref> It is designed to overcome [[bufferbloat]] in [[networking hardware]], such as [[router (computing)|router]]s, by setting limits on th ...bufferbloat]], others relate to weaknesses of alternative queue management algorithms. CoDel was developed as an attempt to address the problem of bufferbloat.<r ...17 KB (2,512 words) - 16:43, 17 August 2024
- ...incorporates location information, such as that from a mobile device, into algorithms to attempt to provide more-relevant recommendations to users. This could i ...[[Gowalla]], [[Swarm (app)|Swarm]], and [[Yelp]]. In addition to geosocial networking services, traditional online social networks such as [[Facebook]] and [[Twi ...10 KB (1,567 words) - 02:42, 8 August 2023
- As computational power and algorithms evolve, graph analytics has become a critical tool for tackling complex pro * '''Networking''': In computer networks, shortest path analysis helps in routing data effi ...23 KB (3,190 words) - 00:28, 6 December 2024