Sciweavers

430 search results - page 11 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
IJON
2007
87views more  IJON 2007»
13 years 7 months ago
A feature-binding model with localized excitations
We study a model of feature binding in prefrontal cortex which defers specific perceptual information to lower areas and merely maintains the identity of the combination. The mod...
Hecke Schrobsdorff, J. Michael Herrmann, Theo Geis...
GLOBECOM
2007
IEEE
14 years 2 months ago
Analysis of the Contention Access Phase of a Reservation MAC Protocol for Wide-Area Data Intensive Sensor Networks
— We propose a contention based reservation MAC protocol for a collaborative sensing scenario involving a set of surveillance UAVs communicating with a hub. Data transmission rig...
Arindam Kumar Das, Sumit Roy, Abhijit Mahalanobis
ALGOSENSORS
2006
Springer
13 years 11 months ago
Area Based Beaconless Reliable Broadcasting in Sensor Networks
: We consider the broadcasting problem in sensor networks where the nodes have no prior knowledge of their neighbourhood. We describe several Area-based Beaconless Broadcasting Alg...
Francisco Javier Ovalle-Martínez, Amiya Nay...
HPDC
2006
IEEE
14 years 2 months ago
WOW: Self-Organizing Wide Area Overlay Networks of Virtual Workstations
— This paper describes WOW, a distributed system that combines virtual machine, overlay networking and peerto-peer techniques to create scalable wide-area networks of virtual wor...
Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin,...
ICISC
2008
89views Cryptology» more  ICISC 2008»
13 years 9 months ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik