Sciweavers

10077 search results - page 1973 / 2016
» Mobile Networking in the Internet
Sort
View
CN
2004
122views more  CN 2004»
13 years 7 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
EC
2000
123views ECommerce» more  EC 2000»
13 years 7 months ago
Embodiment of Evolutionary Computation in General Agents
Holland's Adaptation in Natural and Artificial Systems largely dealt with how systems, comprised of many self-interested entities, can and should adapt as a whole. This semin...
Robert E. Smith, Claudio Bonacina, Paul E. Kearney...
CACM
1998
127views more  CACM 1998»
13 years 7 months ago
The Virtual Reality Modeling Language and Java
Abstract. The Virtual Reality Modeling Language (VRML) and Java provide a standardized, portable and platformindependent way to render dynamic, interactive 3D scenes across the Int...
Donald P. Brutzman
CCR
2008
85views more  CCR 2008»
13 years 7 months ago
On cycles in AS relationships
y be more complex than the course modeling abstraction we adopted in [2]. Real AS relationships may depend on a peering point, prefix, and even time [2]. For example, ISPs that dom...
Xenofontas A. Dimitropoulos, M. Ángeles Ser...
COMCOM
2010
95views more  COMCOM 2010»
13 years 6 months ago
Trading link utilization for queueing delays: An adaptive approach
Understanding the relationship between queueing delays and link utilization for general traffic conditions is an important open problem in networking research. Difficulties in und...
Rade Stanojevic, Robert Shorten
« Prev « First page 1973 / 2016 Last » Next »