Sciweavers

1709 search results - page 280 / 342
» networks 2000
Sort
View
COMCOM
2000
105views more  COMCOM 2000»
13 years 8 months ago
Security broker for multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Aura Ganz, Se Hyun Park, Zvi Ganz
COMCOM
2000
115views more  COMCOM 2000»
13 years 8 months ago
Reducing the protocol overheads of LANE in the MPOA protocol
The ATM networks have been widely adopted as the backbone networks. LANE is adopted by the MPOA protocol for the intra-IASG communication. In LANE, the edge devices have become pe...
Wei Kuang Lai, Kuo-Her Lin
CONCURRENCY
2000
155views more  CONCURRENCY 2000»
13 years 8 months ago
Annotating Java class files with virtual registers for performance
The Java .class file is a compact encoding of programs for a stack-based virtual machine. It is intended for use in a networked environment, which requires machine independence an...
Joel Jones, Samuel N. Kamin
ECCC
2000
158views more  ECCC 2000»
13 years 8 months ago
On the Computational Power of Winner-Take-All
This article initiates a rigorous theoretical analysis of the computational power of circuits that employ modules for computing winner-take-all. Computational models that involve ...
Wolfgang Maass
FMSD
2000
80views more  FMSD 2000»
13 years 8 months ago
Delay-Insensitivity and Semi-Modularity
The study of asynchronous circuit behaviors in the presence of component and wire delays has received a great deal of attention. In this paper, we consider asynchronous circuits wh...
Janusz A. Brzozowski, Hao Zhang 0002