Sciweavers

430 search results - page 48 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
TMC
2008
112views more  TMC 2008»
13 years 8 months ago
Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
Raffaele Bruno, Marco Conti, Enrico Gregori
WWIC
2007
Springer
156views Communications» more  WWIC 2007»
14 years 2 months ago
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
Providing security services for wireless sensor networks plays a vital role in secure network operation especially when sensor networks are deployed in hostile areas. In order to p...
Tran Thanh Dai, Choong Seon Hong
AINA
2007
IEEE
14 years 2 months ago
MAC Address Translation for Enabling Scalable Virtual Private LAN Services
Virtual Private LAN Service (VPLS) has been considered as a feasible solution for transparent LAN service. By virtually locating all of the service intelligence in the provider ed...
Pi-Chung Wang, Chia-Tai Chan, Po-Yen Lin
IMSCCS
2006
IEEE
14 years 2 months ago
Collaborative Peer-to-Peer Service for Information Sharing Using JXTA
Peer-to-Peer (P2P) file sharing networks attract much attention from legal and research communities. The success and popularity of P2P networks provides a new paradigm for sharing...
Hao Shi, Yanchun Zhang, Jingyuan Zhang, Elizabeth ...
ISCAS
2006
IEEE
143views Hardware» more  ISCAS 2006»
14 years 2 months ago
Dynamic computation in a recurrent network of heterogeneous silicon neurons
Abstract—We describe a neuromorphic chip with a twolayer excitatory-inhibitory recurrent network of spiking neurons that exhibits localized clusters of neural activity. Unlike ot...
Paul Merolla, Kwabena Boahen