Sciweavers

10077 search results - page 1973 / 2016
» Mobile Networking in the Internet
Sort
View
CN
2004
122views more  CN 2004»
14 years 11 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
EC
2000
123views ECommerce» more  EC 2000»
14 years 11 months ago
Embodiment of Evolutionary Computation in General Agents
Holland's Adaptation in Natural and Artificial Systems largely dealt with how systems, comprised of many self-interested entities, can and should adapt as a whole. This semin...
Robert E. Smith, Claudio Bonacina, Paul E. Kearney...
CACM
1998
127views more  CACM 1998»
14 years 11 months ago
The Virtual Reality Modeling Language and Java
Abstract. The Virtual Reality Modeling Language (VRML) and Java provide a standardized, portable and platformindependent way to render dynamic, interactive 3D scenes across the Int...
Donald P. Brutzman
CCR
2008
85views more  CCR 2008»
14 years 11 months ago
On cycles in AS relationships
y be more complex than the course modeling abstraction we adopted in [2]. Real AS relationships may depend on a peering point, prefix, and even time [2]. For example, ISPs that dom...
Xenofontas A. Dimitropoulos, M. Ángeles Ser...
COMCOM
2010
95views more  COMCOM 2010»
14 years 10 months ago
Trading link utilization for queueing delays: An adaptive approach
Understanding the relationship between queueing delays and link utilization for general traffic conditions is an important open problem in networking research. Difficulties in und...
Rade Stanojevic, Robert Shorten
« Prev « First page 1973 / 2016 Last » Next »