Sciweavers

1807 search results - page 204 / 362
» Resilient Overlay Networks
Sort
View
139
Voted
NIPS
1997
15 years 6 months ago
Multi-modular Associative Memory
Recent imaging studies suggest that object knowledge is stored in the brain as a distributed network of many cortical areas. Motivated by these observations, we study a multi-modu...
Nir Levy, David Horn, Eytan Ruppin
ADHOC
2006
155views more  ADHOC 2006»
15 years 4 months ago
Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol
Application layer multicasting has emerged as an appealing alternative to network layer multicasting in wireline networks. Here, we examine the suitability of application layer mu...
Min Ge, Srikanth V. Krishnamurthy, Michalis Falout...
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
15 years 11 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
ICC
2007
IEEE
15 years 11 months ago
Optimization of the Self-Protecting Multipath for Deployment in Legacy Networks
—The self-protecting multipath (SPM) is a simple protection switching mechanism that can be implemented, e.g., by MPLS. We present a linear program for the optimization of the SP...
Michael Menth, Rüdiger Martin, Ulrich Spö...
ICCS
2007
Springer
15 years 11 months ago
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks
When wireless senor networks (WSNs) are deployed in hostile areas, they indeed need to be secured by security mechanisms. To do this, cryptographic keys must be agreed on by commun...
Tran Thanh Dai, Choong Seon Hong