Sciweavers

CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 4 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi
IPPS
2003
IEEE
14 years 5 months ago
An Executable Analytical Performance Evaluation Approach for Early Performance Prediction
Percolation has recently been proposed as a key component of an advanced program execution model for future generation high-end machines featuring adaptive data/code transformatio...
Adeline Jacquet, Vincent Janot, Clement Leung, Gua...
MOBIHOC
2004
ACM
15 years 18 hour ago
Latency of wireless sensor networks with uncoordinated power saving mechanisms
Olivier Dousse, Petteri Mannersalo, Patrick Thiran