Sciweavers

4049 search results - page 582 / 810
» Neural Network Trainer through Computer Networks
Sort
View
153
Voted
ICISC
1998
132views Cryptology» more  ICISC 1998»
15 years 5 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
DC
2010
15 years 3 months ago
Distributed algorithms for ultrasparse spanners and linear size skeletons
We present efficient algorithms for computing very sparse low distortion spanners in distributed networks and prove some non-trivial lower bounds on the tradeoff between time, spar...
Seth Pettie
143
Voted
CCR
2006
96views more  CCR 2006»
15 years 3 months ago
XCP for shared-access multi-rate media
The eXplicit Control Protocol (XCP) was developed to overcome some of the limitations of TCP, such as low utilization in high bandwidth delay product networks, unstable throughput...
Filipe Abrantes, Manuel Ricardo
208
Voted
NETWORKS
2010
15 years 2 months ago
A branch-and-cut algorithm for the pickup and delivery traveling salesman problem with LIFO loading
In the Traveling Salesman Problem with Pickup and Delivery (TSPPD) a single vehicle must serve a set of customer requests, each defined by an origin location where a load must be...
Jean-François Cordeau, Manuel Iori, Gilbert...
129
Voted
IPSN
2010
Springer
15 years 10 months ago
Distributed genetic evolution in WSN
Wireless Sensor Actuator Networks (WSANs) extend wireless sensor networks through actuation capability. Designing robust logic for WSANs however is challenging since nodes can a...
Philip Valencia, Peter Lindsay, Raja Jurdak