Sciweavers

285 search results - page 26 / 57
» Characterization of the Existence of Galled-Tree Networks
Sort
View
CORR
2010
Springer
143views Education» more  CORR 2010»
14 years 12 months ago
Continuum Percolation in the Intrinsically Secure Communications Graph
The intrinsically secure communications graph (-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence...
Pedro C. Pinto, Moe Z. Win
TIT
2008
95views more  TIT 2008»
14 years 11 months ago
Distributed Estimation Via Random Access
The problem of distributed Bayesian estimation is considered in the context of a wireless sensor network. The Bayesian estimation performance is analyzed in terms of the expected F...
Animashree Anandkumar, Lang Tong, Ananthram Swami
MOBICOM
2009
ACM
15 years 6 months ago
Connectivity of cognitive radio networks: proximity vs. opportunity
We address the connectivity of large-scale ad hoc cognitive radio networks, where secondary users exploit channels temporarily and locally unused by primary users and the existenc...
Wei Ren, Qing Zhao, Ananthram Swami
ICNP
2007
IEEE
15 years 6 months ago
Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach
Abstract— We address the problem of identifying high throughput paths in 802.11 wireless mesh networks. We introduce an analytical model that accurately captures the 802.11 MAC p...
Theodoros Salonidis, Michele Garetto, A. Saha, Edw...
WINE
2007
Springer
191views Economy» more  WINE 2007»
15 years 5 months ago
The Importance of Network Topology in Local Contribution Games
We consider a model of content contribution in peer-to-peer networks with linear quadratic payoffs and very general interaction patterns. We find that Nash equilibria of this gam...
Jacomo Corbo, Antoni Calvó-Armengol, David ...