By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Abstract--Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are m...
Abstract--Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are m...
—Rooted in a deep understanding of their major properties, a control paradigm for complex systems is proposed based on latest advances in modeling the dynamics of complex network...
Abstract. This paper investigates postmortem timestamp reconstruction in environmental monitoring networks. In the absence of a timesynchronization protocol, these networks use mul...