### Table 1: Network Topologies

"... In PAGE 3: ... Network model Two different network topologies have been considered for our study (Figure 2). Table1 reports the number of nodes N, the number of unidirectional links L, the hop count averaged among all node pairs h and the link capacity C (Mb/s). The reason to have two different topologies is that the smaller 7nodes topology could be implemented both in the simulation study and in a testbed (see II.... ..."

### Table 5: Network Topologies

1995

"... In PAGE 5: ... We used LOOM to experimentally calculate the best network topol- ogy (number of hidden units). Table5 lists the best topology 1Scaling reduces the side effects of scale differences between param- eters. Linear, square root, logarithm, and general data transformation are... ..."

Cited by 4

### Table 1. Network topologies

"... In PAGE 7: ...of different partitionings. To compare the different algorithms, we used the topolo- gies listed in Table1 . The names of the topologies roughly follow the convention: type-nodes-links-otherparam.... ..."

### Table 1. Network Topology.

1997

Cited by 3

### Table II Network Topologies

### Table 2: Network topologies

### Table 6. Unique Network Topologies

"... In PAGE 6: ...able 5. Attacker Classification ..................................................................................................... 42 Table6 .... In PAGE 90: ... Since the number of elements that determine the symmetric topology are half that of the asymmetric case, we calculate the number of symmetric topologies using Equation 3: 2N(N-1)/2. (3) Following Equations 2 and 3, Table6 indicates the total unique network topologies that must be generated and evaluated to ensure all possible message event sequences for a given network size N. These topologies range from fully disconnected, with no links, to fully connected, where each node connects to all other nodes.... ..."

### Table 1. Different Network Topology

"... In PAGE 6: ..., 2 are 2.0, 1.0, and 1.5 respectively. We will compare the end-to-end delays of different topologies NT1 to NT6 listed in Table1 . The Concord algorithm is used at the receivers.... ..."