Many previous papers have pointed out that TCP performance in multi-hop ad hoc networks is not optimal. This is due to several TCP design principles that reflect the characteristi...
Giuseppe Anastasi, Emilio Ancillotti, Marco Conti,...
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
Social Network Analysis is an approach to analysing organisations focusing on relationships as the most important aspect. In this paper we discuss visualisation techniques for Soc...
A review of the main results obtained by the authors concerning analysis of networks with imprecise activity duration times, with a stress on the analysis of criticality, is prese...
Different credit assignment strategies are investigated in a two level co-evolutionary model which involves a population of Gaussian neurons and a population of radial basis funct...