Login / Signup

Method for Finding Protected Nodes for Robust Network against Node Failures.

Tomomi MatsuiHiroyoshi Miwa
Published in: INCoS (2014)
Keyphrases
  • node failures
  • network model
  • data structure
  • data streams
  • peer to peer