Results 201 to 210 of about 419,821 (262)
Some of the next articles are maybe not open access.
Proceedings of the 1983 annual conference on Computers : Extending the human resource - ACM 83, 1983
Network protocols are modeled by processes exchanging messages through communication channels. For finite state protocols, each process participating in the protocol can be represented by a finite state graph. In this paper, we introduce a structuring principle for finite state protocols in the form of subgraphs.
Tat Y. Choi, Raymond E. Miller
openaire +1 more source
Network protocols are modeled by processes exchanging messages through communication channels. For finite state protocols, each process participating in the protocol can be represented by a finite state graph. In this paper, we introduce a structuring principle for finite state protocols in the form of subgraphs.
Tat Y. Choi, Raymond E. Miller
openaire +1 more source
Network Security and Networking Protocols
2010In the field of networking, the specialist area of Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its ...
Arvind Kumar Sharma, Chattar Singh Lamba
openaire +1 more source
Proceedings of the 8th ACM international conference on Autonomic computing, 2011
Recent trends in data communication show that protocols become increasingly complex and context-aware. Correspondingly, the number of new protocols is dramatically growing and their development and management processes entail unanticipated effort and costs. A promising approach to cope with these challenges is to partially automatise the development of
Hurling, Björn +4 more
openaire +2 more sources
Recent trends in data communication show that protocols become increasingly complex and context-aware. Correspondingly, the number of new protocols is dramatically growing and their development and management processes entail unanticipated effort and costs. A promising approach to cope with these challenges is to partially automatise the development of
Hurling, Björn +4 more
openaire +2 more sources
Network-Embedded Social Network Protocols
2012Social network protocols and media are transforming the IT landscape. New IT professionals are integrating social media channels such as instant messaging and microblogging into their professional lives. A natural evolution arises starting with people using social networking to connect to each other, then embedding the same capabilities so that they ...
Carlos Pignataro, Joe Marcus Clarke
openaire +1 more source
ACM SIGCSE Bulletin, 2003
While the construction of Hamming Codes that can detect and correct 1-bit transmission errors has been illustrated [1], Hamming Codes that will detect and correct transmission errors of more than 1 bit remain yet to be constructed.
openaire +1 more source
While the construction of Hamming Codes that can detect and correct 1-bit transmission errors has been illustrated [1], Hamming Codes that will detect and correct transmission errors of more than 1 bit remain yet to be constructed.
openaire +1 more source
2004
Abstract : We propose to dramatically improve the reliability, fault tolerance, and survivability of wide area networks by systematically rethinking network design using the principle that the operation of network protocols should be enforceable - the correct operation of a protocol should not depend on trust.
David J. Wetherall, Tom E. Anderson
openaire +1 more source
Abstract : We propose to dramatically improve the reliability, fault tolerance, and survivability of wide area networks by systematically rethinking network design using the principle that the operation of network protocols should be enforceable - the correct operation of a protocol should not depend on trust.
David J. Wetherall, Tom E. Anderson
openaire +1 more source
2018
OPPORTUNITIES AND CHALLENGES IN WIRELESS SENSOR NETWORKS Martin Haenggi Introduction Opportunities Technical Challenges Concluding Remarks NEXT-GENERATION TECHNOLOGIES TO ENABLE SENSOR NETWORKS Joel I. Goodman, Albert I. Reuther and David R. Martinez Introduction Goals for Real-Time Distributed Network Computing for Sensor Data Fusion The Convergence ...
Imad Mahgoub, Mohammad Ilyas
openaire +1 more source
OPPORTUNITIES AND CHALLENGES IN WIRELESS SENSOR NETWORKS Martin Haenggi Introduction Opportunities Technical Challenges Concluding Remarks NEXT-GENERATION TECHNOLOGIES TO ENABLE SENSOR NETWORKS Joel I. Goodman, Albert I. Reuther and David R. Martinez Introduction Goals for Real-Time Distributed Network Computing for Sensor Data Fusion The Convergence ...
Imad Mahgoub, Mohammad Ilyas
openaire +1 more source
2004
Networks came into existence as soon as there was two of something: two cells, two animals and, obviously, two computers. While the overwhelming popularity of the Internet leads people to think of networks only in a computer context, a network exists anytime there is communication between two or more parties.
Keir Davis, John W. Turner, Nathan Yocom
openaire +1 more source
Networks came into existence as soon as there was two of something: two cells, two animals and, obviously, two computers. While the overwhelming popularity of the Internet leads people to think of networks only in a computer context, a network exists anytime there is communication between two or more parties.
Keir Davis, John W. Turner, Nathan Yocom
openaire +1 more source

