Sciweavers

648 search results - page 100 / 130
» The GCHQ Protocol and Its Problems
Sort
View
IJWIN
2008
126views more  IJWIN 2008»
13 years 8 months ago
IEEE 802.11 Load Balancing: An Approach for QoS Enhancement
Abstract. With the 802.11 WLAN multimedia applications (Video, Audio, realtime voice over IP,...) increasing, providing Quality of Service (QoS) support becomes very important sinc...
Issam Jabri, Nicolas Krommenacker, Thierry Divoux,...
CN
2007
148views more  CN 2007»
13 years 8 months ago
Using taxonomies for content-based routing with ants
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is known yet about its appropriateness for search i...
Elke Michlmayr, Arno Pany, Gerti Kappel
JSAC
2008
95views more  JSAC 2008»
13 years 8 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras
AICOM
2005
91views more  AICOM 2005»
13 years 8 months ago
Multiagent systems for cardiac pacing simulation and control
Abstract. Simulating and controlling physiological phenomena are complex tasks to tackle. This is due to the fact that physiological processes are usually described by a set of par...
Francesco Amigoni, Alessandro Beda, Nicola Gatti
TIFS
2008
208views more  TIFS 2008»
13 years 8 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros