Sciweavers

838 search results - page 13 / 168
» On the Robustness of Complex Networks by Using the Algebraic...
Sort
View
ADHOC
2005
100views more  ADHOC 2005»
13 years 7 months ago
Robust position-based routing for wireless ad hoc networks
We consider a wireless ad hoc network composed of a set of wireless nodes distributed in a two dimensional plane. Several routing protocols based on the positions of the mobile ho...
Kousha Moaveninejad, Wen-Zhan Song, Xiang-Yang Li
ICASSP
2010
IEEE
13 years 7 months ago
Guaranteed robust distributed estimation in a network of sensors
This paper proposes a guaranteed robust bounded-error distributed estimation algorithm. It may be employed to perform parameter estimation from data collected in a network of wire...
Jean-Benoist Leger, Michel Kieffer
CORR
2010
Springer
129views Education» more  CORR 2010»
13 years 7 months ago
The complexity of positive first-order logic without equality
We study the complexity of evaluating positive equality-free sentences of first-order (FO) logic over a fixed, finite structure B. This may be seen as a natural generalisation of ...
Florent R. Madelaine, Barnaby Martin
INFOCOM
1995
IEEE
13 years 11 months ago
Address Management and Connection Control for Multicast Communication Applications
An architecture and associated protocols are presented for managing multicast addresses and performing connection control for applications that use multicast communication faciliti...
Alexandros Eleftheriadis, Sassan Pejhan, Dimitris ...
IPCCC
2005
IEEE
14 years 1 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi