— We analyze the susceptibility of the Internet to random faults, malicious attacks, and mixtures of faults and attacks. We analyze actual Internet data, as well as simulated dat...
Seung-Taek Park, Alexy Khrabrov, David M. Pennock,...
—Relay networks have received considerable attention recently, especially when limited size and power resources impose constraints on the number of antennas within a wireless sen...
Abstract— In this paper, focusing on multihop decode-andforward cooperative networks, a hop-by-hop routing strategy is designed to optimize the end-to-end outage performance when...
Advances in wireless communication, storage and processing are realizing next-generation in-vehicle entertainment systems. Even if hundreds of different video or audio titles are...
—Sensor networks nowadays are widely used for structural health monitoring; for example, the sensor monitoring system deployed on the Guangzhou New TV Tower, China. While wired s...
Tao Zhang, Dan Wang, Jiannong Cao, Yi Qing Ni, Lij...