: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
As the radio spectrum usage paradigm shifting from the traditional command and control allocation scheme to the open spectrum allocation scheme, wireless mesh networks meet new opp...
Tao Chen, Honggang Zhang, Gian Mario Maggio, Imric...
We revisit the problem of computing the topology and geometry of a real algebraic plane curve. The topology is of prime interest but geometric information, such as the position of...
Jinsan Cheng, Sylvain Lazard, Luis Mariano Pe&ntil...
Defining the neighborhood of an initial set of nodes is an important task in network analysis. For example, we show that the neighborhood of an initial set of brain cancer related ...
Internet Service Providers (ISPs) can exploit path diversity to balance load and improve robustness. Unfortunately, it is difficult to evaluate the potential impact of these appr...
Renata Teixeira, Keith Marzullo, Stefan Savage, Ge...