Sciweavers

2421 search results - page 167 / 485
» Approximate Flow-Aware Networking
Sort
View
ICDCSW
2005
IEEE
15 years 9 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
ICANN
2005
Springer
15 years 9 months ago
Interpolation Mechanism of Functional Networks
In this paper, the interpolation mechanism of functional networks is discussed. A kind of fourlayer (with 1 input and 1 output unit) and a five-layer (with double input and single...
Yong-Quan Zhou, Licheng Jiao
FAW
2008
Springer
104views Algorithms» more  FAW 2008»
15 years 5 months ago
Ranking of Closeness Centrality for Large-Scale Social Networks
Abstract. Closeness centrality is an important concept in social network analysis. In a graph representing a social network, closeness centrality measures how close a vertex is to ...
Kazuya Okamoto, Wei Chen, Xiang-Yang Li
122
Voted
PE
2006
Springer
109views Optimization» more  PE 2006»
15 years 3 months ago
A customer threshold property for closed finite queueing networks
-- We present a new class of finite queues in cyclic networks with production blocking. We show that with a threshold property related to the number of customers in the network, th...
Mustafa Yuzukirmizi, J. MacGregor Smith
ALENEX
2001
101views Algorithms» more  ALENEX 2001»
15 years 4 months ago
CNOP - A Package for Constrained Network Optimization
Abstract. We present a generic package for resource constrained network optimization problems. We illustrate the flexibility and the use of our package by solving four applications...
Kurt Mehlhorn, Mark Ziegelmann