Abstract. MPI implementations are faced with growingly complex network configurations containing multiple network interfaces per node, NAT, or dual stacks. To implement handling l...
Wolfgang Schnerring, Christian Kauhaus, Dietmar Fe...
The technique called progressive encryption is used in many areas of content security. However, the plain algorithm itself is only applicable in real transmission scenarios where n...
This paper exhaustively discusses and compares the performance differences between radial basis probabilistic neural networks (RBPNN) and radial basis function neural networks (RBF...
Abstract. The generation of network topologies with specific, userspecified statistical properties is the aim of this paper. This is achieved through the use of an artifical Gene R...
Determining node positions is essential for many next-generation network functionalities. Previous localization algorithms lack correctness guarantees or require network density h...
David Kiyoshi Goldenberg, Pascal Bihler, Yang Rich...