• No results found

arbitrary network with m = 6 nodes and q = 3 loops

On the Convergence of Gaussian Belief Propagation with Nodes of Arbitrary Size

On the Convergence of Gaussian Belief Propagation with Nodes of Arbitrary Size

... This paper is concerned with a multivariate extension of Gaussian message passing applied to pairwise Markov graphs (MGs). Gaussian message passing applied to pairwise MGs is often labeled Gaussian belief propagation ...

37

On sampling nodes in a network

On sampling nodes in a network

... a network has been studied in a number of ...on nodes as the stationary distribution; their main idea is to use a version of the Metropolis–Hastings algorithm for unbi- ...

11

Robust and Computationally Feasible Community Detection in the Presence of Arbitrary Outlier Nodes

Robust and Computationally Feasible Community Detection in the Presence of Arbitrary Outlier Nodes

... Both theoretical and numerical properties of the method are analyzed. A theoretical guarantee is given for the procedure to accurately detect the communities with small misclassification rate under the setting where the ...

37

SECURE MESSAGE TRANSMISSION AGAINST ARBITRARY MALICIOUS NODES IN MULTIPATH ATMOSPHERE

SECURE MESSAGE TRANSMISSION AGAINST ARBITRARY MALICIOUS NODES IN MULTIPATH ATMOSPHERE

... hoc network, such as routing, which are essential for proper network operation, and in the second level of attacks, the adversary tries to damage the security mechanisms employed by the ...the ...

12

Discovery Of Network Nodes And Discrepancies

Discovery Of Network Nodes And Discrepancies

... in network of any organization. Network consists of different devices like switches, hubs, routers ...devices. Network is the arrangement of links and devices in a network and the ...

5

Improved Arbitrary size Benes Network

Improved Arbitrary size Benes Network

... to Q switch. [5,1,8,9] Fig 1: 8*8 Benes network 1.1 Arbitrary size Benes network According to Benes topology the size of the Benes network is always the power of ...the network ...

5

Fast and rigorous arbitrary-precision computation of Gauss-Legendre quadrature nodes and weights

Fast and rigorous arbitrary-precision computation of Gauss-Legendre quadrature nodes and weights

... Completing the details of the proof is a technical exercise. Despite being elegant in theory, the algorithm behind Theorem 1 has a high overhead in practice, in large part due to the need to work with greatly increased ...

23

Wifi mesh network nodes on guifi.net

Wifi mesh network nodes on guifi.net

... All nodes periodically broadcast hello packets, also known as OGMs, to its neighbors, informing its link-local neighors about its ...the network with ...

72

PICQUET: Controlling Malicious Nodes in a Network

PICQUET: Controlling Malicious Nodes in a Network

... the Network does not fail due to the attackers or Hacker and Administrator can block attacker for that ...the network to handle the attacks then he/she can able to handle the system using his/her GPRS ...

5

Miniaturization of wireless sensor network nodes

Miniaturization of wireless sensor network nodes

... sensor network (WSN) node, typically equipped with a radio transceiver, a small microcontroller and a battery, is different from traditional embedded systems because of its requirement of random deployment, small ...

7

CiteSeerX — Effect of Loops on the Vibrational Spectrum of Percolation Network

CiteSeerX — Effect of Loops on the Vibrational Spectrum of Percolation Network

... add loops in a controlled manner, we first mark all perimeter sites which are neighbors to two or more occupied sites ...many loops that are embedded in the interior of the cluster with little influence on ...

12

Net and Nodes: Social Network Analysis and PR

Net and Nodes: Social Network Analysis and PR

... dense network called a ...A network made up of cliques that barely relate to one another will communicate differently than a network made up of a group in which everyone knows everyone ...a ...

11

Clustering Nodes in Wireless Sensor Network: A Survey

Clustering Nodes in Wireless Sensor Network: A Survey

... sensor network is a network of spatially distributed sensor nodes used to sense the physical condition of the target ...Sensor nodes are usually deployed in areas where manual maintenance and ...

6

How To Build A Training System On A Network Of Nodes

How To Build A Training System On A Network Of Nodes

... ABSTRACT We have developed a distributed asynchronous Web based training system. In order to improve the scalability and robustness of this system, all contents and a function that scores user’s answers are realized on ...

6

Identification and Elimination of Selfish Nodes in Adhoc Network

Identification and Elimination of Selfish Nodes in Adhoc Network

... Selfish nodes, AODV, IDS, Watchdog I. INTRODUCTION An Ad Hoc network is the network of self-configuring nodes without having fixed ...Hoc network are designed based on the assumption ...

6

To Increase the Network Lifetime by Using the Relay Nodes

To Increase the Network Lifetime by Using the Relay Nodes

... Sensor network, relay nodes, sensor nodes, lifetime, and ...sensor network is type of wireless ...sensor network consist a number of sensor node, called tiny device and these are ...

7

Detection of Malicious Nodes in Mobile Adhoc Network

Detection of Malicious Nodes in Mobile Adhoc Network

... Listening node verifies that the next node did not modify the packet before transmitting it. The watchdog of a node maintains copies of recently forwarded packets and compares them with the packet transmissions overheard ...

12

How To Model Load Balancing In A Network Of Nodes

How To Model Load Balancing In A Network Of Nodes

... Section 1.2 presents our approach to modeling the computer network and load balancing algorithms to incorporate the presence of delay in communicat- ing between nodes and transferring tasks. Section 1.3 ...

25

Online Estimating the k Central Nodes of a Network

Online Estimating the k Central Nodes of a Network

... central nodes of a network in an online fashion, ...system network and a social network) through ...central nodes is not sampled by the sampling algorithm. Ideally a network ...

5

Predicting Resource Usage of Arbitrary Network Traffic Queries

Predicting Resource Usage of Arbitrary Network Traffic Queries

... of Netflow) and periodically reports to a central collection server. In order to handle the large volumes of data exported and to reduce the load on the router it resorts to packet sam- pling. The sampling rate must be ...

17

Show all 10000 documents...

Related subjects