Sciweavers

908 search results - page 139 / 182
» From communication networks to fuzzy sets
Sort
View
MOBICOM
2006
ACM
15 years 5 months ago
Fast and reliable estimation schemes in RFID systems
RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with t...
Murali S. Kodialam, Thyaga Nandagopal
ISCC
2003
IEEE
120views Communications» more  ISCC 2003»
15 years 5 months ago
DIP: Distance Information Protocol for IDMaps
The Internet Distance Map Service (IDMaps) [3] provides distance estimates between any pair of hosts connected to the Internet. The IDMaps system comprises two component types: Tr...
Yixin Jin, Beichuan Zhang, Vasileios Pappas, Lixia...
LICS
1999
IEEE
15 years 4 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
SIGCOMM
2006
ACM
15 years 5 months ago
Algorithms to accelerate multiple regular expressions matching for deep packet inspection
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most...
Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patr...
CORR
2010
Springer
182views Education» more  CORR 2010»
14 years 12 months ago
Index coding via linear programming
Abstract Anna Blasiak Robert Kleinberg Eyal Lubetzky Index Coding has received considerable attention recently motivated in part by applications such as fast video-on-demand and e...
Anna Blasiak, Robert D. Kleinberg, Eyal Lubetzky