Information quality assurance despite the existence of uncertainty about sources can be investigated in the context of soft security where an agent maintains trustworthiness evalu...
-- In cluster-based routing protocol (CBRP), two-level hierarchical structure is successfully used to reduce over-flooding in wireless ad hoc networks. As it is vulnerable to a sin...
Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata...
This paper claims that in its current use the term ‘network’ represents no more than a suggestive image of organizing in an age of spectacular context-crossing electronic tran...
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Queueing networks are studied with finite capacities for clusters of stations, rather than for individual stations. First, an instructive tandem cluster example is studied to show...