نتایج جستجو برای: resilient networks

تعداد نتایج: 440665  

2006
Lazaros K. Gallos Reuven Cohen Fredrik Liljeros Panos Argyrakis Armin Bunde Shlomo Havlin

In this work, we estimate the resilience of scale-free networks on a number of different attack methods. We study a number of different cases, where we assume that a small amount of knowledge on the network structure is available, or can be approximately estimated. We also present a class of real-life networks that prove to be very resilient on intentional attacks, or equivalently much more dif...

2010
Ochirkhand Erdene-Ochir Marine Minier Fabrice Valois Apostolos Kountouris

This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In th...

Journal: :Telecommunication Systems 2009
Crina Grosan Ajith Abraham Aboul Ella Hassanien

The paper deals with the design of resilient networks that are fault tolerant against link failures. Usually, fault tolerance is achieved by providing backup paths, which are used in case of an edge failure on a primary path. We consider this task as a multiobjective optimization problem: to provide resilience in networks while minimizing the cost subject to capacity constraint. We propose a st...

Journal: :Computer Communications 2007
Hidehisa Nakayama Nirwan Ansari Abbas Jamalipour Nei Kato

Research on wireless sensor networks (WSNs) has received tremendous attention in the past few years due to their potential applications and advances in the VLSI design. In WSNs with tiny sensors, mobility of a sink may provide an energy efficient way for data dissemination. Having a mobile sink in WSN, however, creates new challenges to routing and sensor distribution modeling in the network. I...

2006
Divyashikha Sethia Huzur Saran

This work considers the problem of peer-to-peer video streaming for a critical private web cast, for a medium sized heterogeneous network. The nodes can form an overlay network based on multicast tree at application level. The nodes are assumed to have different bandwidths and reliabilities, with a majority of the nodes having low bandwidths and low reliability such that they can only receive s...

2008
Audun Fosselie Hansen Tom Lippmann Yaoda Liu Anders Nickelsen Hans-Peter Schwefel

Resilient topologies and routing are among the important topics that were addressed within the HIDENETS project and have been the focus of task 1 of Work Package 3 ‘Resilient Communication’. This document provides the results of the work in this area. The document has the following content: (1) The HIDENETS network architecture is described, introducing the relevant terminology and the use case...

2009
Oladayo Salami Antoine Bagula Anthony Chan

In inter-working multi-hop wireless networks, establishing resilient connectivity between source-destination node pairs is a major issue. The issues of connectivity in multihop wireless networks have been studied. However these analyses focused on network connectivity in ad-hoc networks. Since the next generation of wireless networks will be inter-working, an understanding of connectivity as it...

2012
Jian Feng Yu Chen Kwok-Tung Lo Xudong Zhang

When applying conventional standard video codecs in wireless video applications, error resilience and coding efficiency are the two main issues need to be considered. Since it is difficult to corroborate robust quality of service (QoS) in wireless networks, transmitted video packets are sometime lost or corrupted due to fading and shadowing effect of wireless channel. Providing robust video tra...

Journal: :CoRR 2010
Ochirkhand Erdene-Ochir Marine Minier Fabrice Valois Apostolos A. Kountouris

This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In th...

2015
Stefan Dietzel

Applications for vehicular ad hoc networks (VANETs) are an active field of research with the potential to significantly contribute to driver safety, traffic efficiency, and comfort. Messages are typically exchanged and forwarded between vehicles using wireless communication, thereby creating a wireless ad hoc network. Especially traffic efficiency applications require the dissemination of infor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید