Sciweavers

1626 search results - page 125 / 326
» Connections in Networks: A Hybrid Approach
Sort
View
JSAC
2006
140views more  JSAC 2006»
14 years 10 months ago
Backup reprovisioning to remedy the effect of multiple link failures in WDM mesh networks
As networks grow in size and complexity, both the probability and the impact of failures increase. The pre-allocated backup bandwidth, which has been widely investigated in the lit...
Jing Zhang, Keyao Zhu, Biswanath Mukherjee
INFOCOM
2011
IEEE
14 years 1 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
TRIDENTCOM
2006
IEEE
15 years 4 months ago
Cross-layer multi-hop wireless routing for inter-vehicle communication
— Ad-hoc networking provides a cost-effective support structure for inter-vehicle communication. A decentralized peerto-peer information dissemination architecture is well suited...
Jatinder Pal Singh, Nicholas Bambos, Bhaskar Srini...
JMLR
2006
113views more  JMLR 2006»
14 years 10 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
ICANN
2005
Springer
15 years 3 months ago
A Hardware/Software Framework for Real-Time Spiking Systems
Abstract. One focus of recent research in the field of biologically plausible neural networks is the investigation of higher-level functions such as learning, development and modu...
Matthias Oster, Adrian M. Whatley, Shih-Chii Liu, ...