Tesis sobre el tema "Constraint networks"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Constraint networks".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Beaumont, Matthew y n/a. "Handling Over-Constrained Temporal Constraint Networks". Griffith University. School of Information Technology, 2004. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20041213.084512.
Texto completoBeaumont, Matthew. "Handling Over-Constrained Temporal Constraint Networks". Thesis, Griffith University, 2004. http://hdl.handle.net/10072/366603.
Texto completoThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
Institute for Integrated and Intelligent Systems
Full Text
Francisco, Rodriguez Maria Andreina. "Consistency of Constraint Networks Induced by Automaton-Based Constraint Specifications". Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-156441.
Texto completoHassani, Bijarbooneh Farshid. "Constraint Programming for Wireless Sensor Networks". Doctoral thesis, Uppsala universitet, Avdelningen för datalogi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-241378.
Texto completoProFuN
Draghici, Sorin. "Using constraints to improve generalisation and training of feedforward neural networks : constraint based decomposition and complex backpropagation". Thesis, University of St Andrews, 1996. http://hdl.handle.net/10023/13467.
Texto completoCraven, Daniel Shawn. "A formal analysis of the MLS LAN : TCB-to-TCBE, Session Status, & TCBE-to-Session Server Protocols /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FCraven.pdf.
Texto completoVaez, Mohammad-Mehdi. "Nonblocking Banyan-type optical switching networks under crosstalk constraint". Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/13401.
Texto completoChachra, Sumit y Theodore Elhourani. "RESOURCE ALLOCATION IN SENSOR NETWORKS USING DISTRIBUTED CONSTRAINT OPTIMIZATION". International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605299.
Texto completoSeveral algorithms have been proposed for solving constraint satisfaction and the more general constraint optimization problem in a distributed manner. In this paper we apply two such algorithms to the task of dynamic resource allocation in the sensor network domain using appropriate abstractions. The aim is to effectively track multiple targets by making the sensors coordinate with each other in a distributed manner, given a probabilistic representation of tasks (targets). We present simulation results and compare the performance of the DBA and DSA algorithms under varying experimental settings.
Grigoleit, Mark Ted. "Optimisation of large scale network problems". Thesis, Curtin University, 2008. http://hdl.handle.net/20.500.11937/1405.
Texto completoComin, Carlo. "Complexity in Infinite Games on Graphs and Temporal Constraint Networks". Doctoral thesis, Università degli studi di Trento, 2017. https://hdl.handle.net/11572/368151.
Texto completoCraven, Daniel Shawn. "A formal analysis of the MLS LAN: TCB-to-TCBE, Session Status, and TCBE-to-Session Server Protocols". Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1448.
Texto completoThis thesis presents a formal analysis process and the results of applying that process to the MLS LAN: TCB-to- TCBE, Session Status, and TCBE-to-Session Server Protocols. The formal analysis process consists of several distinct stages: the creation of a detailed informal protocol description, analyzing that description to reveal assumptions and areas of interest not directly addressed in the protocol description, the transformation of that description and the related assumptions into a formal Strand Space representation, analyzing that representation to reveal assumptions and areas of interest, and concluding with an application of John Millen's automated Constraint Checker analysis tool to the Strand Space representations under an extremely limited set of conditions to prove certain protocol secrecy properties.
Kabiri, Charles. "On the Performance of Underlay Cognitive Radio Networks with Interference Constraints and Relaying". Doctoral thesis, Blekinge Tekniska Högskola [bth.se], Faculty of Computing - Department of Communication Systems, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-00609.
Texto completoIndrakumar, Selvaratnam. "Towards a constraint-based multi-agent approach to complex applications". Thesis, University of Surrey, 2000. http://epubs.surrey.ac.uk/2095/.
Texto completoSteck, Harald. "Constraint-based structural learning in Bayesian networks using finite data sets". [S.l.] : [s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962067202.
Texto completoAli, Murad. "Offline constraint-based routing in OSPF networks : a server based study". Thesis, University West, Department of Technology, Mathematics and Computer Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-1346.
Texto completoMany of the network applications today are demanding QoS guaranteed paths which the best effort routing protocols e.g. OSPF cannot calculate, because these protocols are topology driven, do not address many of the constraints by these applications and only calculate shortest paths. In this thesis offline constraint based routing is studied for Open Shortest Path First (OSPFv2) protocol single area network and an offline server is proposed for QoS guaranteed routing. The server builds traffic engineering (TE) database and calculates QoS guaranteed paths on behalf of all the routers in that area. The client routers only do best effort routing for normal data flows with no requirement for QoS guaranteed paths. The client routers use NETCONF protocol to download QoS routes from the offline server (OS). The offline server besides calculating QoS paths also reduces congestion and helps in efficiently utilizing the network resources, for example bandwidth.
Dávid, László [Verfasser]. "Algorithms for the constraint-based analysis of metabolic networks / László Dávid". Berlin : Freie Universität Berlin, 2015. http://d-nb.info/1067442243/34.
Texto completoMarashi, Sayed-Amir [Verfasser]. "Constraint-based analysis of substructures of metabolic networks / Sayed-Amir Marashi". Berlin : Freie Universität Berlin, 2011. http://d-nb.info/1025356144/34.
Texto completoHelmberg, Christoph, Sebastian Richter y Dominic Schupke. "A Chance Constraint Model for Multi-Failure Resilience in Communication Networks". Universitätsbibliothek Chemnitz, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-175454.
Texto completoWANG, YUN. "Application-Specific Quality of Service Constraint Design in Wireless Sensor Networks". University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1217598398.
Texto completoMuhammad, Sanusi. "Scalable and network aware video coding for advanced communications over heterogeneous networks". Thesis, Brunel University, 2013. http://bura.brunel.ac.uk/handle/2438/7469.
Texto completoGrigoleit, Mark Ted. "Optimisation of large scale network problems". Curtin University of Technology, Department of Mathematics and Statistics, 2008. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=115092.
Texto completoWe then use this information to constrain the network along a bisecting meridian. The combination of Lagrange Relaxation (LR) and a heuristic for filtering along the meridian provide an aggressive method for finding near-optimal solutions in a short time. Two network problems are studied in this work. The first is a Submarine Transit Path problem in which the transit field contains four sonar detectors at known locations, each with the same detection profile. The side constraint is the total transit time, with the submarine capable of 2 speeds. For the single-speed case, the initial LR duality gap may be as high as 30%. The first hybrid method uses a single centre meridian to constrain the network based on the unused time resource, and is able to produce solutions that are generally within 1% of optimal and always below 3%. Using the computation time for the initial Lagrange Relaxation as a baseline, the average computation time for the first hybrid method is about 30% to 50% higher, and the worst case CPU times are 2 to 4 times higher. The second problem is a random valued network from the literature. Edge costs, times, and lengths are uniform, randomly generated integers in a given range. Since the values given in the literature problems do not yield problems with a high duality gap, the values are varied and from a population of approximately 100,000 problems only the worst 200 from each set are chosen for study. These problems have an initial LR duality gap as high as 40%. A second hybrid method is developed, using values for the unused time resource and the lower bound values computed by Dijkstra’s algorithm as part of the LR method. The computed values are then used to position multiple constraining meridians in order to allow LR to find better solutions.
This second hybrid method is able to produce solutions that are generally within 0.1% of optimal, with computation times that are on average 2 times the initial Lagrange Relaxation time, and in the worst case only about 5 times higher. The best method for solving the Constrained Shortest Path Problem reported in the literature thus far is the LRE-A method of Carlyle et al. (2007), which uses Lagrange Relaxation for preprocessing followed by a bounded search using aggregate constraints. We replace Lagrange Relaxation with the second hybrid method and show that optimal solutions are produced for both network problems with computation times that are between one and two orders of magnitude faster than LRE-A. In addition, these hybrid methods combined with the bounded search are up to 2 orders of magnitude faster than the commercial CPlex package using a straightforward MILP formulation of the problem. Finally, the second hybrid method is used as a preprocessing step on both network problems, prior to running CPlex. This preprocessing reduces the network size sufficiently to allow CPlex to solve all cases to optimality up to 3 orders of magnitude faster than without this preprocessing, and up to an order of magnitude faster than using Lagrange Relaxation for preprocessing. Chapter 1 provides a review of the thesis and some terminology used. Chapter 2 reviews previous approaches to the CSPP, in particular the two current best methods. Chapter 3 applies Lagrange Relaxation to the Submarine Transit Path problem with 2 speeds, to provide a baseline for comparison. The problem is reduced to a single speed, which demonstrates the large duality gap problem possible with Lagrange Relaxation, and the first hybrid method is introduced.
Chapter 4 examines a grid network problem using randomly generated edge costs and weights, and introduces the second hybrid method. Chapter 5 then applies the second hybrid method to both network problems as a preprocessing step, using both CPlex and a bounded search method from the literature to solve to optimality. The conclusion of this thesis and directions for future work are discussed in Chapter 6.
Huang, Shao-shan Carol. "A constraint optimization framework for discovery of cellular signaling and regulatory networks". Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/65772.
Texto completoCataloged from PDF version of thesis.
Includes bibliographical references.
Cellular signaling and regulatory networks underlie fundamental biological processes such as growth, differentiation, and response to the environment. Although there are now various high-throughput methods for studying these processes, knowledge of them remains fragmentary. Typically, the majority of hits identified by transcriptional, proteomic, and genetic assays lie outside of the expected pathways. In addition, not all components in the regulatory networks can be exposed in one experiment because of systematic biases in the assays. These unexpected and hidden components of the cellular response are often the most interesting, because they can provide new insights into biological processes and potentially reveal new therapeutic approaches. However, they are also the most difficult to interpret. We present a technique, based on the Steiner tree problem, that uses a probabilistic protein-protein interaction network and high confidence measurement and prediction of protein-DNA interactions, to determine how these hits are organized into functionally coherent pathways, revealing many components of the cellular response that are not readily apparent in the original data. We report the results of applying this method to (1) phosphoproteomic and transcriptional data from the pheromone response in yeast, and (2) phosphoproteomic, DNaseI hypersensitivity sequencing and mRNA profiling data from the U87MG glioblastoma cell lines over-expressing the variant III mutant of the epidermal growth factor receptor (EGFRvIII). In both cases the method identifies changes in diverse cellular processes that extend far beyond the expected pathways. Analysis of the EGFRVIII network connectivity property and transcriptional regulators that link observed changes in protein phosphorylation and differential expression suggest a few intriguing hypotheses that may lead to improved therapeutic strategy for glioblastoma.
by Shao-shan Carol Huang.
Ph.D.
Xiong, Lixiang. "Scheduling in packet switches with relaxed constraint". School of Electrical, Computer and Telecommunications Engineering - Faculty of Informatics, 2004. http://ro.uow.edu.au/theses/372.
Texto completoGuziolowski, Carito. "Analysis of Large-Scale Biological Networks with Constraint-Based Approaches over Static Models". Phd thesis, Université Rennes 1, 2010. http://tel.archives-ouvertes.fr/tel-00541903.
Texto completoLarhlimi, Abdelhalim [Verfasser]. "New concepts and tools in constraint-based analysis of metabolic networks / Abdelhalim Larhlimi". Berlin : Freie Universität Berlin, 2009. http://d-nb.info/1023579944/34.
Texto completoKocagoncu, Ece. "Dynamic speech networks in the brain : dual contribution of incrementality and constraints in access to semantics". Thesis, University of Cambridge, 2017. https://www.repository.cam.ac.uk/handle/1810/270309.
Texto completoFu, Ser-Geon. "Genetic and evolutionary protocols for solving distributed asymmetric constraint satisfaction problems". Auburn, Ala., 2007. http://repo.lib.auburn.edu/2007%20Spring%20Dissertations/FU_SER-GEON_10.pdf.
Texto completoLu, Wei. "Integer Programming-based Methods for Computing Minimum Reaction Modifications of Metabolic Networks for Constraint Satisfaction". 京都大学 (Kyoto University), 2015. http://hdl.handle.net/2433/199436.
Texto completoManaf, Afwarman 1962. "Constraint-based software for broadband networks planninga software framework for planning with the holistic approach /". Monash University, Dept. of Electrical and Computer Systems Engineering, 2000. http://arrow.monash.edu.au/hdl/1959.1/8163.
Texto completoServín, Meneses Christian. "An optimization approach for the cascade vulnerability problem". To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Texto completoAravena, Andrés. "Probabilistic and constraint based modelling to determine regulation events from heterogeneous biological data". Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00922346.
Texto completoKoker, Ezgi. "Chance Constrained Optimization Of Booster Disinfection In Water Distribution Networks". Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613640/index.pdf.
Texto completoManaf, Afwarman 1962. "Constraint-based software for broadband networks planning : a software framework for planning with the holistic approach". Monash University, Dept. of Electrical and Computer Systems Engineering, 2000. http://arrow.monash.edu.au/hdl/1959.1/7754.
Texto completoJenkins, Glenn Llewellyn. "Evolved neural network approximation of discontinuous vector fields in unit quaternion space (S³) for anatomical joint constraint". Thesis, University of South Wales, 2007. https://pure.southwales.ac.uk/en/studentthesis/evolved-neural-network-approximation-of-discontinuous-vector-fields-in-unit-quaternion-space-s3-for-anatomical-joint-constraint(f375e712-038c-4a78-862a-944c0e36e360).html.
Texto completoPsujek, Sean Thomas. "The Role of Developmental Bias in a Simulated Evo-devo System". Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1232655232.
Texto completoLukachan, George. "Scalable energy-efficient location aided routing (SELAR) protocol for wireless sensor networks". [Tampa, Fla] : University of South Florida, 2005. http://purl.fcla.edu/usf/dc/et/SFE0001366.
Texto completoBrettner, Leandra M. y Joanna Masel. "Protein stickiness, rather than number of functional protein-protein interactions, predicts expression noise and plasticity in yeast". BioMed Central, 2012. http://hdl.handle.net/10150/610103.
Texto completoChoi, Gi Wan. "Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability". Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47721.
Texto completoLang, Philipp Sebastian [Verfasser] y Erwin [Akademischer Betreuer] Frey. "Reptation in entangled polymer networks : a simulational study of the significance of constraint release for reptation / Philipp Sebastian Lang. Betreuer: Erwin Frey". München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2015. http://d-nb.info/1104698013/34.
Texto completoPiesker, Björn. "Constraint-basierte Generierung realitätsnaher Eisenbahnnetze". Master's thesis, Universität Potsdam, 2007. http://opus.kobv.de/ubp/volltexte/2007/1532/.
Texto completoThis work deals with the development of an application, which generates infrastructure data of railway networks. The focus of this work concentrates on the generation process of topological information. As input for the application a characterization of the intended railway network is given as attributes, which are handled as constraints in the generation process. To satisfy these restrictions constraint programming, a special programming paradigm, which is able to search efficently consistent solutions, is applied. In particular, the use of so-called global constraints improves the computation. For that reason the role of constraint-programming in modelling and implementing these application is discussed in more detail.
Andrade, Tales Pinheiro de. "Interações gênicas usando redes booleanas limiarizadas modeladas como um problema de satisfação de restrições". Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-05062012-150618/.
Texto completoThe chemical reactions that result in gene expression are complex and not yet fully understood. It is known that genes send, receive and process information to form a complex network of com- munication, but the architecture and dynamics of these networks are not fully known. Thus, one major problem is to determine how genes are linked within the cell. This process of determining the relationship between genes is known as inference of genetic networks. One way to represent the relationship between genes is to use mathematical and computer models of genetic networks. In particular, one of the models of great interest are Boolean Networks (BN), in which genes can take two states, active or inactive, if they are, respectively, expressed or not. These states may vary over time, depending on how genes are related. Our interest is in studying a case of this particular model, known as thresholded Boolean networks, where only one class of Boolean functions is used to build the GNs. To infer the thresholded Boolean networks, we use an algorithm that consists of two steps. First, we use the framework of Constraint Satisfaction Problem (CSP) to infer sets of solutions consistent with a time series of a given set of genes. Then analyze the dynamic behavior of the solutions, filtering sets of solutions with interest for practical tests in the laboratory. Using the framework of the CSP, we constructed a solver, using the library Gecode, 2 for in- ference of consistent networks, using as input a time series arising from microarrays data. Then, by simulating the dynamics of a sample of networks found in the previous step, we were able to determine some interesting constraints to filter the set of networks. We apply our method to three datasets: two artificial, and for validation, we use a time series of an artificial network known from literature. Thus we were able to infer genetic networks sets of possible interest for laboratory tests.
Tunc, Ilker. "Epidemic models on adaptive networks with network structure constraints". W&M ScholarWorks, 2013. https://scholarworks.wm.edu/etd/1539623618.
Texto completoLi, Ruogu. "Principles and Methods of Adaptive Network Algorithm Design under Various Quality-of-Service Requirements". The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1354642003.
Texto completoBit-Monnot, Arthur. "Temporal and Hierarchical Models for Planning and Acting in Robotics". Phd thesis, Toulouse, INPT, 2016. http://oatao.univ-toulouse.fr/17704/1/Arthur%20Bit-Monnot.pdf.
Texto completoComin, Carlo. "Complexité dans les Jeux Infinis sur les Graphes et les Réseaux de Contraintes Temporelles". Thesis, Paris Est, 2017. http://www.theses.fr/2017PESC1061/document.
Texto completoThis dissertation deals with a number of algorithmic problems motivated by automated temporal planning and formal verification of reactive and finite state systems. We focused on game theoretical methods to obtain novel insights, improved complexity bounds, and faster algorithms for the following models: Hyper Temporal Networks, Conditional Simple/Hyper Temporal Networks, Update Games, Muller McNaughton Games, and Mean Payoff Games
Gong, Shujia. "Solutions to constrained path computation in multi-layer networks". Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2932.
Texto completoTitle from PDF t.p. (viewed Jan. 18, 2008). Thesis director: Bijan Jabbari Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical and Computer Engineering. Vita: p. 113. Includes bibliographical references (p. 109-112). Also available in print.
Trick, Michael Alan. "Networks with additional structured constraints". Diss., Georgia Institute of Technology, 1987. http://hdl.handle.net/1853/23371.
Texto completoNikbakht, Homa. "Networks with mixed-delay constraints". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT046.
Texto completoModern wireless communication networks have to accommodate different types of data traffic with different latency constraints. In particular, delay-sensitive video-applications represent an increasing portion of data traffic. Modern networks also have to accommodate high total data rates, which they can accomplish for example with cooperating terminals or with helper relays such as drones. However, cooperation typically introduces additional communication delays, and is thus not applicable to delay-sensitive data traffic.This thesis focuses on interference networks with mixed-delay constraints and on system architectures where neighbouring transmitters and/or neighbouring receivers can cooperate. In such systems, delay-sensitive messages have to be encoded and decoded without further delay and thus cannot benefit from available cooperation links.We propose various coding schemes that can simultaneously accommodate the transmission of both delay-sensitive and delay-tolerant messages. For the proposed schemes we analyze the multiplexing gains (MG) they achieve over Wyner's soft hand-off network, Wyner's symmetric network, the hexagonal network and the sectorized hexagonal network. For Wyner's soft hand-off network and Wyner's symmetric network, we also provide tight information-theoretic converse results and thus establish the exact set of MG pairs that can simultaneously be achieved for delay-sensitive and delay-tolerant data. These results demonstrate that when both transmitters and receivers cooperate and the cooperation rates are sufficiently large, it is possible to achieve the largest MG for delay-sensitive messages without penalizing the maximum sum MG of both delay-sensitive and delay-tolerant messages. In contrast, under our proposed schemes, the sending of delay-sensitive data in hexagonal models decreases the maximum sum MG. This penalty vanishes when we consider the sectorized hexagonal network where each cell is divided into three non-interfering sectors by employing directional antennas at the base stations.We further propose similar coding schemes for scenarios with different types of random user activity. We specifically consider two setups. In the first setup, each active transmitter always has delay-tolerant data to send and delay-sensitive data arrival is random. In the second setup, both delay-tolerant and delay-sensitive data arrivals are random. The obtained MG regions show that in the first setup, increasing the delay-sensitive MG always decreases the sum MG. In contrast, in the second setup, for certain parameters, the highest sum MG is achieved at maximum delay-sensitive MG and thus increasing the delay-sensitive MG provides a gain in sum MG.Additionally, we also study a cloud radio access network with mixed delay constraints, i.e., where each mobile user can simultaneously send a delay-sensitive and a delay-tolerant stream and only the delay-tolerant data is jointly decoded at the cloud unit. For this network, we derive inner and outer bounds on the capacity region under mixed delay constraints, and we exactly characterize the optimal MG region. At high signal-to-noise ratio (SNR), our results show that for moderate fronthaul capacities, the maximum MG for delay-sensitive messages remains unchanged over a large regime of small and moderate MGs of delay-sensitive messages. The sum MG is thus improved if some of the messages can directly be decoded at the base stations. At moderate SNR, the results show that when the data rate of delay-sensitive messages is small or moderate, the achievable sum rate is constant
Terrasson, Guillaume. "Contribution à la conception d'émetteur-récepteur pour microcapteurs autonomes". Thesis, Bordeaux 1, 2008. http://www.theses.fr/2008BOR13682/document.
Texto completoSurvey on wireless microsensor networks highlights the main constraint of energy autonomy. In fact, these autonomous and communicating microcomponents named network nodes are scattered into few or not open environment. The goal of our work is to propose a transceiver design method adapted to microsensor networks. After a demonstration of predominant part of RF into the mean power consumption of a microsensor node, we developed three new simulation tools which correspond to different level of transceiver modelling. Their use and obtained simulation results demonstrate the relation between transceiver specifications and performances with power consumption. The association of these tools was used to propose a new design method under power consumption constraint. Finally, we designed, produced and tested a 868 MHz Low Noise Amplifier which presents interesting power consumption characteristics
Irava, Venkata Srinivas. "Low-cost delay-constrained multicast routing heuristics and their evaluation". Online access for everyone, 2006. http://www.dissertations.wsu.edu/Dissertations/Summer2006/v%5Firava%5F072106.pdf.
Texto completo