Sciweavers

3288 search results - page 35 / 658
» Feed-links for network extensions
Sort
View
PERCOM
2004
ACM
16 years 1 months ago
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
This paper introduces a context-aware authorization architecture that is designed to augment existing network security protocols in an Intranet environment. It describes the archi...
Chris Wullems, Mark Looi, Andrew Clark
137
Voted
ICPP
2000
IEEE
15 years 6 months ago
Nonblocking WDM Multicast Switching Networks
ÐWith ever increasing demands on bandwidth from emerging bandwidth-intensive applications, such as video conferencing, E-commerce, and video-on-demand services, there has been an ...
Yuanyuan Yang, Jianchao Wang, Chunming Qiao
TC
2008
15 years 1 months ago
Iterative Local Solutions for Connected Dominating Set in Ad Hoc Wireless Networks
We propose a general framework of the iterative local solution (ILS) for computing a connected dominating set (CDS) in ad hoc wireless networks, which include wireless sensor netwo...
Jie Wu, Fei Dai, Shuhui Yang
IJBC
2010
62views more  IJBC 2010»
14 years 11 months ago
Excitable Networks: nonequilibrium Criticality and Optimum Topology
Excitable media may be modeled as simple extensions of the Amari
Joaquín J. Torres, Sebastiano de Franciscis...
100
Voted
WOWMOM
2006
ACM
151views Multimedia» more  WOWMOM 2006»
15 years 7 months ago
Network Coding for Wireless Mesh Networks: A Case Study
Network coding is a new transmission paradigm that proved its strength in optimizing the usage of network resources. In this paper, we evaluate the gain from using network coding ...
Anwar Al Hamra, Chadi Barakat, Thierry Turletti