Login / Signup
Efficient solutions for the authenticated fragmentation problem in delay- and disruption-tolerant networks.
Michael Noisternig
Matthias Hollick
Published in:
MSWiM (2014)
Keyphrases
</>
efficient solutions
bicriteria
bi objective
optimal solution
social networks
heuristic methods
supply chain
genetic algorithm
computer networks
key distribution