Sciweavers

899 search results - page 22 / 180
» On Wiretap Networks II
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Capacity of byzantine agreement with finite link capacity
—We consider the problem of maximizing the throughput of Byzantine agreement, when communication links have finite capacity. Byzantine agreement is a classical problem in distri...
Guanfeng Liang, Nitin H. Vaidya
ICC
2007
IEEE
100views Communications» more  ICC 2007»
14 years 1 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci
CORR
2008
Springer
136views Education» more  CORR 2008»
13 years 7 months ago
Data Fusion Trees for Detection: Does Architecture Matter?
We consider the problem of decentralized detection in a network consisting of a large number of nodes arranged as a tree of bounded height, under the assumption of conditionally in...
Wee-Peng Tay, John N. Tsitsiklis, Moe Z. Win
CSE
2009
IEEE
13 years 11 months ago
Information Technology Capabilities for Digital Social Networks
This paper contributes to the evolving body of knowledge pertaining to the study of digitally-enabled social networks, their usage, and their effects on people, organization, and s...
Camille Grange, Izak Benbasat
CCR
2008
88views more  CCR 2008»
13 years 7 months ago
Rethinking virtual network embedding: substrate support for path splitting and migration
Network virtualization is a powerful way to run multiple architectures or experiments simultaneously on a shared infrastructure. However, making efficient use of the underlying re...
Minlan Yu, Yung Yi, Jennifer Rexford, Mung Chiang