Sciweavers

644 search results - page 102 / 129
» A topological characterization of weakness
Sort
View
INFOCOM
2009
IEEE
15 years 6 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
COST
2009
Springer
184views Multimedia» more  COST 2009»
15 years 6 months ago
Cross-Layer Optimization Issues for Realizing Transparent Mesh Optical Networks
In transparent optical networks as the signal propagates through a transparent network it experiences the impact of a variety of quality degrading phenomena that are introduced by ...
Siamak Azodolmolky, Tibor Cinkler, Dimitrios Kloni...
GLOBECOM
2008
IEEE
15 years 6 months ago
Performance Metric Sensitivity Computation for Optimization and Trade-Off Analysis in Wireless Networks
Abstract—We develop and evaluate a new method for estimating and optimizing various performance metrics for multihop wireless networks, including MANETs. We introduce an approxim...
John S. Baras, Vahid Tabatabaee, George Papageorgi...
ICASSP
2008
IEEE
15 years 6 months ago
Distributed average consensus in sensor networks with quantized inter-sensor communication
— The paper studies distributed average consensus in sensor networks, when the sensors exchange quantized data at each time step. We show that randomizing the exchanged sensor da...
Soummya Kar, José M. F. Moura
INFOCOM
2008
IEEE
15 years 6 months ago
Which Distributed Averaging Algorithm Should I Choose for my Sensor Network?
Average consensus and gossip algorithms have recently received significant attention, mainly because they constitute simple and robust algorithms for distributed information proc...
Patrick Denantes, Florence Bénézit, ...