Sciweavers

1490 search results - page 286 / 298
» The Logic of Authentication Protocols
Sort
View
ISTA
2004
13 years 9 months ago
Evidential Paradigm and Intelligent Mathematical Text Processing
Abstract: This paper presents the evidential paradigm of computer-supported mathematical assistance in "doing" mathematics and in reasoning activity. At present, the evid...
Alexander V. Lyaletski, Anatoly E. Doroshenko, And...
SIGCOMM
2010
ACM
13 years 7 months ago
A mobile peer-to-peer system for opportunistic content-centric networking
In this work we present a middleware architecture for a mobile peer-to-peer content distribution system. Our architecture allows wireless content dissemination between mobile node...
Ólafur Ragnar Helgason, Emre A. Yavuz, Sylv...
IJSNET
2008
118views more  IJSNET 2008»
13 years 7 months ago
A fuzzy-based virtual backbone routing for large-scale MANETs
: Virtual backbone-based routing is a promising approach for enhancing the routing efficiency in MANETs. To establish communication in the network, the virtual backbone nodes have ...
Wassim El-Hajj, Dionysios Kountanis, Ala I. Al-Fuq...
IJSNET
2008
94views more  IJSNET 2008»
13 years 7 months ago
Connection data rate optimisation of IEEE 802.15.3 scatternets with multirate carriers
: Designed for high rate Wireless Personal Area Networks (WPANs), the IEEE 802.15.3 Medium Access Control (MAC) protocol supports peer-to-peer communications in a piconet. In this ...
Zhanping Yin, Victor C. M. Leung
IAJIT
2007
150views more  IAJIT 2007»
13 years 7 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...