Sciweavers

4049 search results - page 528 / 810
» Neural Network Trainer through Computer Networks
Sort
View
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
15 years 10 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
123
Voted
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
15 years 9 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
INFOCOM
2009
IEEE
15 years 10 months ago
Exact Analysis of Latency of Stateless Opportunistic Forwarding
Abstract—Stateless opportunistic forwarding is a simple faulttolerant distributed approach for data delivery and information querying in wireless ad hoc networks, where packets a...
Chi-Kin Chau, Prithwish Basu
ICWMC
2006
IEEE
15 years 10 months ago
Design and Evaluation of eTIMIP - an Overlay Micro-Mobility Architecture based on TIMIP
All the proposed IP mobility protocols assume that the mobile nodes always have a mobility-aware IP stack. On the other hand, efficient micro-mobility solutions entail specific to...
Pedro Vale Estrela, Teresa Maria Vazão, M&a...
LCN
2005
IEEE
15 years 9 months ago
Improving the Data Transmission Throughput over the Home Electrical Wiring
Abstract— Powerline communications (PLC) are receiving special attention since they use an already available and ubiquitous infrastructure. The main standard for PLC home network...
Miguel Elias M. Campista, Luís Henrique Mac...