Results 11 to 20 of about 1,278,074 (287)

Designing Network Protocols for Good Equilibria [PDF]

open access: yes, 2010
Designing and deploying a network protocol determines the rules by which end users interact with each other and with the network. We consider the problem of designing a protocol to optimize the equilibrium behavior of a network with selfish users.
Chen, Ho-Lin   +2 more
core   +1 more source

Real-life performance of protocol combinations for wireless sensor networks [PDF]

open access: yes, 2010
Wireless sensor networks today are used for many and diverse applications like nature monitoring, or process and wireless building automation. However, due to the limited access to large testbeds and the lack of benchmarking standards, the real-life ...
De Poorter, Eli   +4 more
core   +2 more sources

Enhanced Logical Representations of a Real Network Based on an Algebraic Model

open access: yesIEEE Access, 2020
The algebraic model and logical representations of a real network are important but very challenging issues in automatic network verification. In this paper, we abstract the concrete network to its corresponding abstract graph with enhanced vertices and ...
Yi Pan, Suixiang Gao, Wenguo Yang
doaj   +1 more source

Quantum linear network coding as one-way quantum computation [PDF]

open access: yes, 2014
Network coding is a technique to maximize communication rates within a network, in communication protocols for simultaneous multi-party transmission of information.
de Beaudrap, Niel, Roetteler, Martin
core   +2 more sources

Protocols for Packet Quantum Network Intercommunication

open access: yesIEEE Transactions on Quantum Engineering, 2021
A quantum network, which involves multiple parties pinging each other with quantum messages, could revolutionize communication, computing, and basic sciences.
Nengkun Yu, Ching-Yi Lai, Li Zhou
doaj   +1 more source

Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks [PDF]

open access: yes, 2007
We initiate the study of distributed protocols over directed anonymous networks that are not necessarily strongly connected. In such networks, nodes are aware only of their incoming and outgoing edges, have no unique identity, and have no knowledge of ...
Bruck, Jehoshua   +2 more
core   +4 more sources

BSBI – a Simple Protocol for Remote Verification of Identity

open access: yesJournal of Telecommunications and Information Technology, 2012
The paper presents the design and the rationale behind a simple verification protocol for autonomous verification modules, and the architecture enabling use of such modules.
Tomasz Pałka, Adam Kozakiewicz
doaj   +1 more source

Marine Network Protocols and Security Risks

open access: yesJournal of Cybersecurity and Privacy, 2021
Marine network protocols are domain-specific network protocols that aim to incorporate particular features within the specialized marine context that devices are implemented in.
Ky Tran   +3 more
doaj   +1 more source

1991 and networked interoperability

open access: yesLiber Quarterly: The Journal of European Research Libraries, 2017
1991, the year of the first call in the Libraries Programme, was a very different time; the network infrastructure was being built, computers were becoming more powerful, and the information society was being formed based on different technological ...
Birte Christensen-Dalsgaard
doaj   +1 more source

Network equilibrium of heterogeneous congestion control protocols [PDF]

open access: yes, 2005
When heterogeneous congestion control protocols that react to different pricing signals share the same network, the resulting equilibrium may no longer be interpreted as a solution to the standard utility maximization problem.
Chiang, Mung   +3 more
core   +4 more sources

Home - About - Disclaimer - Privacy