Sciweavers

8259 search results - page 259 / 1652
» On Generalized Feistel Networks
Sort
View
CORR
2010
Springer
180views Education» more  CORR 2010»
15 years 25 days ago
A Network Coding Approach to Loss Tomography
Network tomography aims at inferring internal network characteristics based on measurements at the edge of the network. In loss tomography, in particular, the characteristic of in...
Athina Markopoulou, Christina Fragouli, Minas Gjok...
92
Voted
CCR
2006
76views more  CCR 2006»
15 years 24 days ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato
86
Voted
CORR
2006
Springer
78views Education» more  CORR 2006»
15 years 23 days ago
Opti{c,m}al: Optical/Optimal Routing in Massively Dense Wireless Networks
Abstract-- We study routing for massively dense wireless networks, i.e., wireless networks that contain so many nodes that, in addition to their usual microscopic description, a no...
Roberto Catanuto, Stavros Toumpis, Giacomo Morabit...
100
Voted
CCR
2007
176views more  CCR 2007»
15 years 22 days ago
Enhanced wireless mesh networking for ns-2 simulator
The ns-2 simulator has limited support for simulating 802.11based wireless mesh networks. We have added the following new features at the MAC and PHY layer of ns-2: (i) cumulative...
Vivek Mhatre
113
Voted
ISI
2008
Springer
15 years 22 days ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang