An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
In this paper, the interpolation mechanism of functional networks is discussed. A kind of fourlayer (with 1 input and 1 output unit) and a five-layer (with double input and single...
Abstract. Closeness centrality is an important concept in social network analysis. In a graph representing a social network, closeness centrality measures how close a vertex is to ...
-- We present a new class of finite queues in cyclic networks with production blocking. We show that with a threshold property related to the number of customers in the network, th...
Abstract. We present a generic package for resource constrained network optimization problems. We illustrate the flexibility and the use of our package by solving four applications...