Sciweavers

589 search results - page 91 / 118
» Efficient and dependable overlay networks
Sort
View
ISCC
2007
IEEE
100views Communications» more  ISCC 2007»
14 years 2 months ago
End-to-End Mean Bandwidth Estimation as a Function of Packet Length in Mobile Ad Hoc Networks
Many methods for end-to-end bandwidth estimation on wired networks assume that link capacities are constant and that all cross-traffic interaction occurs through queuing delays at...
Marco A. Alzate, Maria P. Salamanca, Néstor...
WIMOB
2007
IEEE
14 years 1 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
ISCC
2005
IEEE
105views Communications» more  ISCC 2005»
14 years 1 months ago
Enhanced Protection Using Shared Segment Backups in a Multiservice GMPLS-Based Networks
The paper presents a novel protection methodology for setting protected paths in a multiservice GMPLSbased network scenario. By applying the proposed methods, label switched paths...
Anna Urra, Eusebi Calle, José-Luis Marzo
ECAI
2010
Springer
13 years 8 months ago
Unsupervised Layer-Wise Model Selection in Deep Neural Networks
Abstract. Deep Neural Networks (DNN) propose a new and efficient ML architecture based on the layer-wise building of several representation layers. A critical issue for DNNs remain...
Ludovic Arnold, Hélène Paugam-Moisy,...
MIS
2008
Springer
130views Multimedia» more  MIS 2008»
13 years 7 months ago
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
In most of the ad-hoc routing protocols, a static link lifetime (LL) is used for a newly discovered neighbors. Though this works well for networks with fixed infrastructures, it is...
Essam Natsheh, Tat Chee Wan