Sciweavers

2200 search results - page 222 / 440
» Hop Integrity in Computer Networks
Sort
View
TCS
2008
15 years 3 months ago
Modeling spiking neural networks
A notation for the functional specification of a wide range of neural networks consisting of temporal or non-temporal neurons, is proposed. The notation is primarily a mathematica...
Ioannis D. Zaharakis, Achilles D. Kameas
130
Voted
EWSN
2007
Springer
16 years 3 months ago
Versatile Support for Efficient Neighborhood Data Sharing
Many applications in wireless sensor networks rely on data from neighboring nodes. However, the effort for developing efficient solutions for sharing data in the neighborhood is of...
Andreas Lachenmann, Daniel Minder, Kurt Rothermel,...
ICN
2007
Springer
15 years 10 months ago
Distance-Dependent RED Policy (DDRED)
— The network quality of service (QoS) and the congestion control of the transport protocol are important parameters for the performance of a network data transfer. To this end, ...
Sebastien Linck, Eugen Dedu, François Spies
ADHOCNOW
2004
Springer
15 years 9 months ago
Session-Based Service Discovery and Access Control in Peer-to-Peer Communications
Abstract. Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP provides a flexible and scalable service discovery framework over IP netwo...
Anand Dersingh, Ramiro Liscano, Allan G. Jost, Hao...
135
Voted
DAC
2005
ACM
16 years 5 months ago
High performance encryption cores for 3G networks
This paper presents two novel and high performance hardware architectures, implemented in FPGA technology, for the KASUMI block cipher; this algorithm lies at the core of the conf...
René Cumplido, Tomás Balderas-Contre...