Thomas F. La Porta

Learn More
Community detection is an important issue due to its wide use in designing network protocols such as data forwarding in Delay Tolerant Networks (DTN) and worm containment in Online Social Networks (OSN). However, most of the existing community detection algorithms focus on binary networks. Since most networks are naturally weighted such as DTN or OSN, in(More)
Internet is growing exponentially due to an increased subscriber base and new applications. Wide area wireless networks are also experiencing rapid growth in terms of subscribers. Currently, there are many efforts underway to provide data services on wireless access networks. The Internet Protocol (IP) is the dominant internetworking protocol in operation(More)
When multiple networks are interconnected because of mutual service interdependence, propagation of phenomena across the networks is likely to occur. Depending on the type of networks and phenomenon, the propagation may be a desired effect, such as the spread of information or consensus in a social network, or an unwanted one, such as the propagation of a(More)
Advanced targeted cyber attacks often rely on reconnaissance missions to gather information about potential targets and their location in a networked environment to identify vulnerabilities which can be exploited for further attack maneuvers. Advanced network scanning techniques are often used for this purpose and are automatically executed by malware(More)
Network Utility Maximization (NUM) techniques, which cast resource sharing problems as one of distributed utility maximization, have been investigated for a variety of optimization problems in wireless and wired networks. Our recent work has extended the NUM framework to consider the case of resource sharing by multiple competing missions in a(More)
— We consider the problem of efficient tag identification in RFID networks. Among the solutions recently proposed for tag identification, a variant of the Framed Slotted Aloha protocol, called Tree Slotted Aloha (TSA), has been shown to achieve the lowest identification delay and highest time system efficiency. However, in case of a large number of tags,(More)
  • 1