Sciweavers

1737 search results - page 277 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ICC
2009
IEEE
190views Communications» more  ICC 2009»
15 years 5 days ago
Low Bound of Energy-Latency Trade-Off of Opportunistic Routing in Multi-Hop Networks
During the last decade, many works were devoted to improving the performance of relaying techniques in ad hoc networks. One promising approach consists in allowing the relay nodes ...
Ruifeng Zhang, Jean-Marie Gorce, Katia Jaffr&egrav...
HSNMC
2004
Springer
158views Multimedia» more  HSNMC 2004»
15 years 7 months ago
HMM-Based Monitoring of Packet Channels
Abstract. Performance of real-time applications on network communication channels are strongly related to losses and temporal delays. Several studies showed that these network feat...
Pierluigi Salvo Rossi, Francesco Palmieri, Giulio ...
IJON
2002
154views more  IJON 2002»
15 years 2 months ago
Nonlinear model predictive control of a cutting process
Nonlinear model predictive control (MPC) of a simulated chaotic cutting process is presented. The nonlinear MPC combines a neural-network model and a genetic-algorithm-based optim...
Primoz Potocnik, Igor Grabec
ICC
2007
IEEE
15 years 8 months ago
Performance Study of Bandwidth Allocation Techniques for QoS-Constrained Satellite Networks
—The paper analyzes the performance of the bandwidth allocation process over satellite communication systems in presence of specific Quality of Service (QoS) requirements. The re...
Igor Bisio, Mario Marchese
ICPP
2009
IEEE
15 years 5 days ago
A Parallel Algorithm for Computing Betweenness Centrality
In this paper we present a multi-grained parallel algorithm for computing betweenness centrality, which is extensively used in large-scale network analysis. Our method is based on ...
Guangming Tan, Dengbiao Tu, Ninghui Sun