Sciweavers

730 search results - page 74 / 146
» Reflections on network architecture: an active networking pe...
Sort
View
CSREASAM
2004
15 years 1 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal
GEOINFORMATICA
2000
99views more  GEOINFORMATICA 2000»
14 years 11 months ago
GIS Software for Measuring Space-Time Accessibility in Transportation Planning and Analysis
: Transportation systems exist to improve individual accessibility. However, emerging applications of GIS in transportation (GIS-T) and intelligent transportation system (ITS) focu...
Harvey J. Miller, Yi-Hwa Wu
MOBIWAC
2009
ACM
15 years 6 months ago
MeshScan: fast and efficient handoff in IEEE802.11 mesh networks
Handoff delay is one of the major problems in Wireless Mesh Network (WMN) that needs to be solved in order to allow time-critical and real-time applications run continuously durin...
Yin Chen, Karol Kowalik, Mark Davis
IJON
2006
87views more  IJON 2006»
14 years 11 months ago
Collective plasticity and individual stability in cultured neuronal networks
Cultured neuronal networks generate spontaneous activity in the form of synchronized bursting events (SBEs)--short time events during which most of the recorded neurons fire rapid...
Nadav Raichman, Vladislav Volman, Eshel Ben-Jacob
IPSN
2007
Springer
15 years 6 months ago
Micro power meter for energy monitoring of wireless sensor networks at scale
We present SPOT, a scalable power observation tool that enables in situ measurement of nodal power and energy over a dynamic range exceeding four decades or a temporal resolution ...
Xiaofan Jiang, Prabal Dutta, David E. Culler, Ion ...