Sciweavers

8080 search results - page 101 / 1616
» From Computer Networks to Agent Networks
Sort
View
EUROCRYPT
2007
Springer
15 years 9 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
IDEAL
2004
Springer
15 years 8 months ago
Building Genetic Networks for Gene Expression Patterns
Building genetic regulatory networks from time series data of gene expression patterns is an important topic in bioinformatics. Probabilistic Boolean networks (PBNs) have been deve...
Wai-Ki Ching, Eric S. Fung, Michael K. Ng
MWCN
2004
Springer
15 years 8 months ago
Peer-to-Peer Based Architecture for Mobility Management in Wireless Networks
: Mobility management is an important task in wireless networks. The Mobile IP protocol provides a basic solution to the mobility management. However, Mobile IP suffers from severa...
Shou-Chih Lo, Wen-Tsuen Chen
HPCN
2000
Springer
15 years 6 months ago
Ruling Agent Motion in Structured Environments
The design and development of cooperative Internet applications based on mobile agents require appropriate modelling of both the physical space where agents roam and the conceptual...
Marco Cremonini, Andrea Omicini, Franco Zambonelli
ICC
2008
IEEE
123views Communications» more  ICC 2008»
15 years 9 months ago
Providing End-to-End Connectivity to SIP User Agents Behind NATs
— The widespread diffusion of private networks in SOHO scenarios is fostering an increased deployment of Network Address Translators (NATs). The presence of NATs seriously limits...
Mario Baldi, Luca De Marco, Fulvio Risso, Livio To...