Sciweavers

8080 search results - page 285 / 1616
» From Computer Networks to Agent Networks
Sort
View
NCA
2005
IEEE
15 years 9 months ago
Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration
The Kasumi block cipher provides integrity and confidentiality services for 3G wireless networks, but it also forms a bottleneck due to its computational overhead. Especially in ...
Gunnar Gaubatz, Berk Sunar
ANCS
2008
ACM
15 years 6 months ago
Data path credentials for high-performance capabilities-based networks
Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any d...
Tilman Wolf
INFOCOM
2011
IEEE
14 years 7 months ago
Aggregation capacity of wireless sensor networks: Extended network case
—A critical function of wireless sensor networks (WSNs) is data gathering. While, one is often only interested in collecting a relevant function of the sensor measurements at a s...
Cheng Wang, Changjun Jiang, Yunhao Liu, Xiang-Yang...
MFCS
2009
Springer
15 years 10 months ago
The Cost of Stability in Network Flow Games
The core of a cooperative game contains all stable distributions of a coalition’s gains among its members. However, some games have an empty core, with every distribution being ...
Ezra Resnick, Yoram Bachrach, Reshef Meir, Jeffrey...
AINA
2009
IEEE
15 years 11 months ago
An Evaluation of Routing Reliability in Non-collaborative Opportunistic Networks
An opportunistic network is a type of challenged network that has attracted a great deal of attention in recent years. While a number of schemes have been proposed to facilitate d...
Ling-Jyh Chen, Che-Liang Chiou, Yi-Chao Chen