Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...
In this paper, we propose the concept of centralized dynamic spectrum leasing (C-DSL), in which multiple primary users belonging to the same primary system participate in the spect...
K. Hakim, Sudharman K. Jayaweera, Georges El-Howay...
One of the most fundamental problems in large-scale network analysis is to determine the importance of a particular node in a network. Betweenness centrality is the most widely us...
— Simulation tools are popular in the design and study of communication systems and networks. The implementation of analytic distributed simulations commonly require a central en...
This paper discusses fast parallel algorithms for evaluating several centrality indices frequently used in complex network analysis. These algorithms have been optimized to exploi...