Sciweavers

1388 search results - page 160 / 278
» Approximability of Robust Network Design
Sort
View
72
Voted
CORR
2006
Springer
92views Education» more  CORR 2006»
15 years 19 days ago
Myopic Coding in Wireless Networks
Abstract -We investigate the achievable rate of data transmission from sources to sinks through a multiple-relay network. We study achievable rates for omniscient coding, in which ...
Lawrence Ong, Mehul Motani
JCP
2008
206views more  JCP 2008»
15 years 17 days ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
103
Voted
JSAC
2006
111views more  JSAC 2006»
15 years 17 days ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
119
Voted
TPDS
2008
202views more  TPDS 2008»
15 years 15 days ago
Control-Based Adaptive Middleware for Real-Time Image Transmission over Bandwidth-Constrained Networks
Real-time image transmission is crucial to an emerging class of distributed embedded systems operating in open network environments. Examples include avionics mission replanning ov...
Xiaorui Wang, Ming Chen, Huang-Ming Huang, Venkita...
SSS
2009
Springer
103views Control Systems» more  SSS 2009»
15 years 7 months ago
Network-Friendly Gossiping
The emergence of large-scale distributed applications based on many-to-many communication models, e.g., broadcast and decentralized group communication, has an important impact on ...
Sabina Serbu, Etienne Riviere, Pascal Felber