Sciweavers

364 search results - page 38 / 73
» Shortest-path network interdiction
Sort
View
ISCIS
2004
Springer
14 years 29 days ago
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks
Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs a...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
GLOBECOM
2010
IEEE
13 years 5 months ago
Admission Control and Channel Allocation for Supporting Real-Time Applications in Cognitive Radio Networks
Abstract--Proper admission control in cognitive radio networks is critical in providing QoS guarantees to secondary unlicensed users. In this paper, we study the admission control ...
Feng Wang, Junhua Zhu, Jianwei Huang, Yuping Zhao
CIC
2006
102views Communications» more  CIC 2006»
13 years 9 months ago
On-line Algorithm for Server Selection of Video Streaming over P2P Networks
We consider a video streaming application over P2P networks and introduce the P2P on-line server selection problem. This task is related to the classic K-server problem, known fro...
Hao Wang, Andras Farago
WEA
2010
Springer
245views Algorithms» more  WEA 2010»
14 years 2 months ago
Contraction of Timetable Networks with Realistic Transfers
We successfully contract timetable networks with realistic transfer times. Contraction gradually removes nodes from the graph and adds shortcuts to preserve shortest paths. This r...
Robert Geisberger
ISCC
2003
IEEE
135views Communications» more  ISCC 2003»
14 years 26 days ago
High Performance Routing in a LEO Satellite Network
Satellite systems are designed as a backup system to the existing land based wireless systems. Because of the global coverage of the system it becomes more economic for the rural ...
Roy Kucukates, Cem Ersoy