Sciweavers

1653 search results - page 228 / 331
» Timed analysis of security protocols
Sort
View
ITCC
2005
IEEE
14 years 3 months ago
Performance Analysis of Mobile Backbone Topology Synthesis Algorithm for Wireless Ad Hoc Networks
In this paper, we present a scalable fully distributed version of a Mobile Backbone Network Topology Synthesis Algorithm (MBN-TSA) for constructing and maintaining a dynamic backb...
Laura Huei-jiun Ju, Izhak Rubin
MYCRYPT
2005
Springer
189views Cryptology» more  MYCRYPT 2005»
14 years 3 months ago
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm
In this paper we produce a practical and efficient algorithm to find a decomposition of type n = kˆ i=1 2si 3ti , si, ti ∈ N ∪ {0} with k ≤   c + o(1) ¡ log n log log n ....
Mathieu Ciet, Francesco Sica
NECO
2008
111views more  NECO 2008»
13 years 10 months ago
A Neural Network Model of the Eriksen Task: Reduction, Analysis, and Data Fitting
We analyze a neural network model of the Eriksen task, a twoalternative forced choice task in which subjects must correctly identify a central stimulus and disregard flankers that...
Yuan Sophie Liu, Philip Holmes, Jonathan D. Cohen
INFOCOM
2010
IEEE
13 years 8 months ago
Routing Primitives for Wireless Mesh Networks: Design, Analysis and Experiments
—In this paper, we consider routing in multi-hop wireless mesh networks. We analyze three standardized and commonly deployed routing mechanisms that we term “nodepair discovery...
Stanislav Miskovic, Edward W. Knightly
ICC
2007
IEEE
107views Communications» more  ICC 2007»
14 years 4 months ago
The SILO Architecture for Services Integration, controL, and Optimization for the Future Internet
— We propose a new internetworking architecture that represents a departure from current philosophy and practice, as a contribution to the ongoing debate regarding the future Int...
Rudra Dutta, George N. Rouskas, Ilia Baldine, Arno...