Results 11 to 20 of about 1,278,074 (287)
Designing Network Protocols for Good Equilibria [PDF]
Designing and deploying a network protocol determines the rules by which end users interact with each other and with the network. We consider the problem of designing a protocol to optimize the equilibrium behavior of a network with selfish users.
Chen, Ho-Lin +2 more
core +1 more source
Real-life performance of protocol combinations for wireless sensor networks [PDF]
Wireless sensor networks today are used for many and diverse applications like nature monitoring, or process and wireless building automation. However, due to the limited access to large testbeds and the lack of benchmarking standards, the real-life ...
De Poorter, Eli +4 more
core +2 more sources
Enhanced Logical Representations of a Real Network Based on an Algebraic Model
The algebraic model and logical representations of a real network are important but very challenging issues in automatic network verification. In this paper, we abstract the concrete network to its corresponding abstract graph with enhanced vertices and ...
Yi Pan, Suixiang Gao, Wenguo Yang
doaj +1 more source
Quantum linear network coding as one-way quantum computation [PDF]
Network coding is a technique to maximize communication rates within a network, in communication protocols for simultaneous multi-party transmission of information.
de Beaudrap, Niel, Roetteler, Martin
core +2 more sources
Protocols for Packet Quantum Network Intercommunication
A quantum network, which involves multiple parties pinging each other with quantum messages, could revolutionize communication, computing, and basic sciences.
Nengkun Yu, Ching-Yi Lai, Li Zhou
doaj +1 more source
Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks [PDF]
We initiate the study of distributed protocols over directed anonymous networks that are not necessarily strongly connected. In such networks, nodes are aware only of their incoming and outgoing edges, have no unique identity, and have no knowledge of ...
Bruck, Jehoshua +2 more
core +4 more sources
BSBI – a Simple Protocol for Remote Verification of Identity
The paper presents the design and the rationale behind a simple verification protocol for autonomous verification modules, and the architecture enabling use of such modules.
Tomasz Pałka, Adam Kozakiewicz
doaj +1 more source
Marine Network Protocols and Security Risks
Marine network protocols are domain-specific network protocols that aim to incorporate particular features within the specialized marine context that devices are implemented in.
Ky Tran +3 more
doaj +1 more source
1991 and networked interoperability
1991, the year of the first call in the Libraries Programme, was a very different time; the network infrastructure was being built, computers were becoming more powerful, and the information society was being formed based on different technological ...
Birte Christensen-Dalsgaard
doaj +1 more source
Network equilibrium of heterogeneous congestion control protocols [PDF]
When heterogeneous congestion control protocols that react to different pricing signals share the same network, the resulting equilibrium may no longer be interpreted as a solution to the standard utility maximization problem.
Chiang, Mung +3 more
core +4 more sources

