Results 41 to 50 of about 6,979,871 (382)
Network unfairness in dragonfly topologies [PDF]
Dragonfly networks arrange network routers in a two-level hierarchy, providing a competitive cost-performance solution for large systems. Non-minimal adaptive routing (adaptive misrouting) is employed to fully exploit the path diversity and increase the performance under adversarial traffic patterns.
Mateo Valero+5 more
openaire +5 more sources
Underwater acoustic networks are widely used in survey missions and environmental monitoring. When an underwater acoustic network (UAN) is deployed in a marine region or two UANs merge, each node hardly knows the entire network and may not have a unique ...
Ruiqin Zhao+4 more
doaj +1 more source
Topology Control Algorithm considering Antenna Radiation Pattern in Three-Dimensional Wireless Sensor Networks [PDF]
Topology control is a key issue of wireless sensor network to reduce energy consumption and communication collision. Topology control algorithms in three-dimensional space have been proposed by modifying existing two-dimensional algorithms.
Bahramgiri M., Wattenhofer R., Xiong Y.
core +2 more sources
Topology of molecular interaction networks [PDF]
Molecular interactions are often represented as network models which have become the common language of many areas of biology. Graphs serve as convenient mathematical representations of network models and have themselves become objects of study. Their topology has been intensively researched over the last decade after evidence was found that they share
Dick de Ridder+6 more
openaire +4 more sources
The Minimum Scheduling Time for Convergecast in Wireless Sensor Networks
We study the scheduling problem for data collection from sensor nodes to the sink node in wireless sensor networks, also referred to as the convergecast problem. The convergecast problem in general network topology has been proven to be NP-hard.
Changyong(Andrew) Jung+2 more
doaj +1 more source
TopoObfu:A Network Topology Obfuscation Mechanism to Defense Network Reconnaissance [PDF]
Some typical network attacks,such as link-flooding attack,need to be carried out on critical links based on topology reconnaissance,which has strong destructiveness and stealthiness.In order to defense these attacks effectively,TopoObfu,a topology ...
LIU Ya-qun, XING Chang-you, GAO Ya-zhuo, ZHANG Guo-min
doaj +1 more source
Reconstruction of Directed Networks from Consensus Dynamics [PDF]
This paper addresses the problem of identifying the topology of an unknown, weighted, directed network running a consensus dynamics. We propose a methodology to reconstruct the network topology from the dynamic response when the system is stimulated by a
Preciado, Victor M., Shahrampour, Shahin
core +1 more source
The Dynamics of Network Topology
Network monitoring is vital to ensure proper network operation over time, and is tightly integrated with all the data intensive processing tasks used by the LHC experiments. In order to build a coherent set of network management services it is very important to collect in near real-time information about the network topology, the main data flows ...
Voicu, Ramiro+5 more
openaire +4 more sources
The rainbow connection was first introduced by Chartrand in 2006 and then in 2009 Krivelevich and Yuster first time introduced the rainbow vertex connection. Let graph be a connected graph.
Muhammad Ilham Nurfaizi Annadhifi+3 more
doaj +1 more source
Reactive explorers to unravel network topology [PDF]
A procedure is developed and tested to recover the distribution of connectivity of an a priori unknown network, by sampling the dynamics of an ensemble made of reactive walkers.
Adam, Ihusan+3 more
core +2 more sources