Sciweavers

2035 search results - page 187 / 407
» Communicating Scala Objects
Sort
View
CORR
2006
Springer
206views Education» more  CORR 2006»
13 years 9 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 9 months ago
An Agent-Based Best Effort Routing Technique for Load Balancing
Abstract. Several best effort schemes (next-hop routing) are used to transport the data in the Internet. Some of them do not perform flexible route computations to cope up with the...
Sunilkumar S. Manvi, Pallapa Venkataram
CORR
2007
Springer
143views Education» more  CORR 2007»
13 years 9 months ago
On Myopic Sensing for Multi-Channel Opportunistic Access
We consider a multi-channel opportunistic communication system where the states of these channels evolve as independent and statistically identical Markov chains (the Gilbert-Elli...
Qing Zhao, Bhaskar Krishnamachari, Keqin Liu
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 9 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
INFORMATICALT
2007
123views more  INFORMATICALT 2007»
13 years 9 months ago
Design and Implementation of Parallel Counterpropagation Networks Using MPI
The objective of this research is to construct parallel models that simulate the behavior of artificial neural networks. The type of network that is simulated in this project is t...
Athanasios Margaris, Stavros Souravlas, Efthimios ...