Sciweavers

2680 search results - page 60 / 536
» The topology of the independence complex
Sort
View
SIGCOMM
2004
ACM
14 years 3 months ago
A first-principles approach to understanding the internet's router-level topology
A detailed understanding of the many facets of the Internet’s topological structure is critical for evaluating the performance of networking protocols, for assessing the effecti...
Lun Li, David Alderson, Walter Willinger, John Doy...
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 7 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
IEEESCC
2008
IEEE
14 years 4 months ago
A Model for Digital Business Ecosystem and Topological Analysis
—This paper presents a novel approach to model a complex evolving system, a Digital Business Ecosystem (DBE) that takes the specific needs of Small and Medium-sized Enterprises ...
Juan Wang, Philippe De Wilde
GPC
2007
Springer
14 years 4 months ago
Heterogeneous Wireless Sensor Network Deployment and Topology Control Based on Irregular Sensor Model
Heterogeneous wireless sensor network (heterogeneous WSN) consists of sensor nodes with different ability, such as different computing power and sensing range. Compared with homoge...
Chun-Hsien Wu, Yeh-Ching Chung
WDAG
2004
Springer
86views Algorithms» more  WDAG 2004»
14 years 3 months ago
Message-Optimal and Latency-Optimal Termination Detection Algorithms for Arbitrary Topologies
An important problem in distributed systems is to detect termination of a distributed computation. A computation is said to have terminated when all processes have become passive ...
Neeraj Mittal, Subbarayan Venkatesan, Sathya Peri