Seventh International Conference on Networking (Icn 2008) 2008
DOI: 10.1109/icn.2008.50
|View full text |Cite
|
Sign up to set email alerts
|

Applying a Macro Model of Ad Hoc Networks to Access Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2010
2010
2011
2011

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…22, we plot the locations of all bottleneck nodes. According to our previous result in [9], [10], [11], most bottleneck nodes are located at bottlenecks identified by our network partition rule. When a bottleneck node is just one hop away from our bottleneck links, this node is called "on bottlenecks"; if it is two hops away, it is called "near bottlenecks"; and the remaining bottleneck nodes are called "far away".…”
Section: Columbia University Campusmentioning
confidence: 56%
See 1 more Smart Citation
“…22, we plot the locations of all bottleneck nodes. According to our previous result in [9], [10], [11], most bottleneck nodes are located at bottlenecks identified by our network partition rule. When a bottleneck node is just one hop away from our bottleneck links, this node is called "on bottlenecks"; if it is two hops away, it is called "near bottlenecks"; and the remaining bottleneck nodes are called "far away".…”
Section: Columbia University Campusmentioning
confidence: 56%
“…In our previous research [7], [8], [9], we introduced a macro model to perform flow and access control in frequently changing mobile networks. The macro model represents a wireless network as a collection of super nodes and links that resemble a wired network.…”
mentioning
confidence: 99%