An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Future computer networks are expected to carry bursty real-time traffic with stringent time-delay requirements. Popular shortest-path routing protocols have the disadvantage of ca...
Sangman Bak, Albert Mo Kim Cheng, Jorge Arturo Cob...
We present a system for regression using MLP neural networks with hyperbolic tangent functions in the input, hidden and output layer. The activation functions in the input and outp...
— We consider a network of spatially distributed sensors deployed to track the intensity of a diffusing source whose location is fixed, but unknown. The sensors make discrete ti...
This paper presents a new mathematical model of AIMD (Additive Increase Multiplicative Decrease) TCP for general networks that we believe is better than those previously used when...