Sciweavers

7544 search results - page 84 / 1509
» Network Forensics Analysis
Sort
View
WECWIS
2007
IEEE
148views ECommerce» more  WECWIS 2007»
15 years 4 months ago
The Core and Shapley Value Analysis for Cooperative Formation of Procurement Networks
Formation of high value procurement networks involves a bottom-up assembly of complex production, assembly, and exchange relationships through supplier selection and contracting d...
T. S. Chandrashekar, Y. Narahari
E2EMON
2006
IEEE
15 years 3 months ago
An Analysis of Active End-to-end Bandwidth Measurements in Wireless Networks
— For active, probing-based bandwidth measurements performed on top of the unifying IP layer, it may seem reasonable to expect the measurement problem in wireless networks to be ...
Andreas Johnsson, Mats Björkman, Bob Melander
WWIC
2004
Springer
123views Communications» more  WWIC 2004»
15 years 3 months ago
Experimental Analysis of Heterogeneous Wireless Networks
Packet loss and delay in Internet degrade the quality of requested services like VoIP (Voice over IP) or Video Streaming. In novel network scenarios where wired and wireless connec...
Giulio Iannello, Antonio Pescapè, Giorgio V...
PE
2008
Springer
102views Optimization» more  PE 2008»
14 years 9 months ago
Multipoint-to-point lightpaths in all-optical networks: Dimensioning and cost analysis
One of the major concerns in optical networks is the bandwidth underutilization problem. In fact, as WDM technology keeps maturing, there is a bandwidth gap between the transmissi...
Nizar Bouabdallah, Guy Pujolle, Harry G. Perros
CORR
2012
Springer
195views Education» more  CORR 2012»
13 years 5 months ago
Ranking hubs and authorities using matrix functions
The notions of subgraph centrality and communicability, based on the exponential of the adjacency matrix of the underlying graph, have been effectively used in the analysis of und...
Michele Benzi, Ernesto Estrada, Christine Klymko