Sciweavers

899 search results - page 5 / 180
» On Wiretap Networks II
Sort
View
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 7 months ago
Asymptotic Traffic Flow in an Hyperbolic Network II: Non-uniform Traffic
In this work we study the asymptotic traffic behaviour in Gromov's hyperbolic spaces when the traffic decays exponentially with the distance. We prove that under general condi...
Yuliy Baryshnikov, Gabriel H. Tucci
JSAC
2006
128views more  JSAC 2006»
13 years 7 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
WAW
2007
Springer
122views Algorithms» more  WAW 2007»
14 years 1 months ago
A Geometric Preferential Attachment Model of Networks II
We study a random graph Gn that combines certain aspects of geometric random graphs and preferential attachment graphs. This model yields a graph with power-law degree distributio...
Abraham D. Flaxman, Alan M. Frieze, Juan Vera
PRESENCE
2006
111views more  PRESENCE 2006»
13 years 7 months ago
On Consistency and Network Latency in Distributed Interactive Applications: A Survey - Part II
This paper is the second part of a two part paper that documents a detailed survey of the research carried out on consistency and latency in distributed interactive applications (...
Declan Delaney, Tomás Ward, Séamus M...