Sciweavers

3319 search results - page 131 / 664
» The topology of dark networks
Sort
View
INFOCOM
2010
IEEE
15 years 1 days ago
TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client
—BitTorrent (BT) has carried out a significant and continuously increasing portion of Internet traffic. While several designs have been recently proposed and implemented to imp...
Shansi Ren, Enhua Tan, Tian Luo, Songqing Chen, Le...
138
Voted
ICCCN
2007
IEEE
15 years 8 months ago
A Bio-Inspired Robust Routing Protocol for Mobile Ad Hoc Networks
—In this paper we discuss robustness issues of a biologically inspired routing protocol for mobile ad hoc networks and the influence it has on the Quality of Service (QoS) in th...
Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata
EVOW
2008
Springer
15 years 3 months ago
Reconstruction of Networks from Their Betweenness Centrality
Abstract. In this paper we study the reconstruction of a network topology from the values of its betweenness centrality, a measure of the influence of each of its nodes in the diss...
Francesc Comellas, Juan Paz-Sánchez
108
Voted
CONCUR
2009
Springer
15 years 8 months ago
Query-Based Model Checking of Ad Hoc Network Protocols
Abstract. A prominent source of complexity in the verification of ad hoc network (AHN) protocols is the fact that the number of network topologies grows exponentially with the squ...
Anu Singh, C. R. Ramakrishnan, Scott A. Smolka
DIALM
2008
ACM
140views Algorithms» more  DIALM 2008»
15 years 3 months ago
Latency of opportunistic forwarding in finite regular wireless networks
In opportunistic forwarding, a node randomly relays packets to one of its neighbors based on local information, without the knowledge of global topology. Each intermediate node co...
Prithwish Basu, Chi-Kin Chau