Sciweavers

408 search results - page 33 / 82
» Network laws
Sort
View
DMIN
2006
105views Data Mining» more  DMIN 2006»
13 years 11 months ago
Structural Analysis and Destabilizing Terrorist Networks
This paper proposed structural analysis and mathematical methods for destabilizing terrorist networks. The three different approaches are discussed for example: (i) cohesion analys...
Nasrullah Memon, Henrik Legind Larsen
MSWIM
2009
ACM
14 years 4 months ago
HUBCODE: message forwarding using hub-based network coding in delay tolerant networks
Most people-centric delay tolerant networks have been shown to exhibit power-law behavior. Analysis of the temporal connectivity graph of such networks reveals the existence of hu...
Shabbir Ahmed, Salil S. Kanhere
CDC
2008
IEEE
109views Control Systems» more  CDC 2008»
14 years 4 months ago
MDLn: A Motion Description Language for networked systems
— In this paper we extend the definition of a Motion Description Language (MDL) to networked systems. This new construction (MDLn) supports inter-agent specification rules as w...
Patrick Martin, Jean-Pierre de la Croix, Magnus Eg...
MOBIHOC
2007
ACM
14 years 9 months ago
Capacity scaling in delay tolerant networks with heterogeneous mobile nodes
We provide a general framework for the analysis of the capacity scaling properties in mobile ad-hoc networks with heterogeneous nodes and spatial inhomogeneities. Existing analyti...
Michele Garetto, Paolo Giaccone, Emilio Leonardi
ICASSP
2009
IEEE
14 years 4 months ago
Evaluating digital audio authenticity with spectral distances and ENF phase change
This paper discusses the use of spectral distances obtained from adaptive filters employed as linear predictors and phase change of the electric network frequency to evaluate dig...
Daniel Patricio Nicolalde, Jose Antonio Apolinario