Sciweavers

2722 search results - page 34 / 545
» Hastily formed networks
Sort
View
IJWIN
2002
111views more  IJWIN 2002»
15 years 10 days ago
Internet Connectivity for Ad Hoc Mobile Networks
The growing deployment rate of wireless LANs indicates that wireless networking is rapidly becoming a prevalent form of communication. As users become more accustomed to the use o...
Yuan Sun, Elizabeth M. Belding-Royer, Charles E. P...
105
Voted
CORR
2010
Springer
205views Education» more  CORR 2010»
14 years 11 months ago
An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks
—Wireless mesh networks (WMNs) are evolving as a key technology for next-generation wireless networks showing raid progress and numerous applications. These networks have the pot...
Jaydip Sen, Kaustav Goswami
91
Voted
IJBIDM
2010
80views more  IJBIDM 2010»
14 years 11 months ago
Practical algorithms for subgroup detection in covert networks
: In this paper, we present algorithms for subgroup detection and demonstrated them with a real-time case study of USS Cole bombing terrorist network. The algorithms are demonstrat...
Nasrullah Memon, Uffe Kock Wiil, Abdul Rasool Qure...
89
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Optimal Probing for Unicast Network Delay Tomography
—Network tomography has been proposed to ascertain internal network performances from end-to-end measurements. In this work, we present priority probing, an optimal probing schem...
Yu Gu, Guofei Jiang, Vishal Singh, Yueping Zhang
95
Voted
NOMS
2010
IEEE
154views Communications» more  NOMS 2010»
14 years 11 months ago
Extending a knowledge-based network to support temporal event reasoning
—While the polling or request/response paradigm adopted by many network and systems management approaches form the backbone of modern monitoring and management systems, the most ...
John Keeney, Clay Stevens, Declan O'Sullivan