Sciweavers

408 search results - page 48 / 82
» Network laws
Sort
View
AUTOMATICA
2005
103views more  AUTOMATICA 2005»
13 years 9 months ago
Incorporating state estimation into model predictive control and its application to network traffic control
Model predictive control (MPC) is of interest because it is one of the few control design methods which preserves standard design variables and yet handles constraints. MPC is nor...
Jun Yan, Robert R. Bitmead
ICC
2007
IEEE
130views Communications» more  ICC 2007»
14 years 4 months ago
A Novel Key Redistribution Scheme for Wireless Sensor Networks
— Key management has long been a challenging problem in wireless Distributed Sensor Networks (DSNs) due to their high security requirements and strict resource constraints. Recen...
Chun-Fai Law, Ka-Shun Hung, Yu-Kwong Kwok
CNSR
2005
IEEE
14 years 3 months ago
Shortest-Hop Based Reliable Network Multicast
Although many multicast communication protocols have been recommended at IETF, reliable multicast communications currently rely on programs built at the application layer, e.g., m...
Ka Lun Eddie Law, Daniel Siu
GLOBECOM
2006
IEEE
14 years 4 months ago
A Novel Semi-Markov Smooth Mobility Model for Mobile Ad Hoc Networks
Abstract— Existing random mobility models have their limitations such as speed decay and sharp turn which have been demonstrated by the previous studies. More importantly, mobili...
Ming Zhao 0001, Wenye Wang
IJBIDM
2010
80views more  IJBIDM 2010»
13 years 8 months ago
Practical algorithms for subgroup detection in covert networks
: In this paper, we present algorithms for subgroup detection and demonstrated them with a real-time case study of USS Cole bombing terrorist network. The algorithms are demonstrat...
Nasrullah Memon, Uffe Kock Wiil, Abdul Rasool Qure...