Sciweavers

5114 search results - page 299 / 1023
» Complex networks
Sort
View
144
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
Efficient Construction of Weakly-Connected Dominating Set for Clustering Wireless Ad Hoc Networks
In most of the proposed clustering algorithms for wireless ad hoc networks, the cluster-heads form a dominating set in the network topology. A variant of dominating set which is mo...
Bo Han, Weijia Jia
119
Voted
PERVASIVE
2005
Springer
15 years 9 months ago
Parasitic Mobility for Pervasive Sensor Networks
Distributed sensor networks offer many new capabilities for contextually monitoring environments. By making such systems mobile, we increase the application-space for the distribut...
Mathew Laibowitz, Joseph A. Paradiso
124
Voted
GECCO
2004
Springer
211views Optimization» more  GECCO 2004»
15 years 9 months ago
Node-Depth Encoding for Evolutionary Algorithms Applied to Network Design
Network design involves several areas of engineering and science. Computer networks, electrical circuits, transportation problems, and phylogenetic trees are some examples. In gene...
Alexandre C. B. Delbem, André Carlos Ponce ...
137
Voted
WETICE
1997
IEEE
15 years 8 months ago
Providing Secure Environments for Untrusted Network Applications
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
Qun Zhong
135
Voted
ARCS
2006
Springer
15 years 7 months ago
Constraint-Based Deployment of Distributed Components in a Dynamic Network
Hierarchical software components offer interesting characteristics for the development of complex applications. However, supporting the deployment of such applications is difficult...
Didier Hoareau, Yves Mahéo