Sciweavers

4714 search results - page 266 / 943
» Cognitive Packet Networks
Sort
View
IMA
2009
Springer
132views Cryptology» more  IMA 2009»
15 years 11 months ago
Subspace Codes
Abstract. This paper is a survey of bounds and constructions for subspace codes designed for the injection metric, a distance measure that arises in the context of correcting adver...
Azadeh Khaleghi, Danilo Silva, Frank R. Kschischan...
IAW
2003
IEEE
15 years 9 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.
ICPADS
2000
IEEE
15 years 9 months ago
A Stateless QoS Signaling Protocol for the Internet
We describe a simple protocol that enhances the communication between end nodes and “the network”. Other than the majority of QoS signaling systems, it achieves scalability by...
Michael Welzl
FOCS
1996
IEEE
15 years 8 months ago
Universal Stability Results for Greedy Contention-Resolution Protocols
In this paper, we analyze the behavior of communication networks in which packets are generated dynamically at the nodes and routed in discrete time steps across the edges. We foc...
Matthew Andrews, Baruch Awerbuch, Antonio Fern&aac...
LCN
2006
IEEE
15 years 10 months ago
On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
We propose an evidence theory based anonymity measuring approach for wireless mobile ad-hoc networks. In our approach, an evidence is a measure of the number of detected packets w...
Dijiang Huang