Results 31 to 40 of about 1,290,040 (147)

AN IMPLEMENTATION STUDY OF DMM PMIPV6 PROTOCOL ON DUAL-STACK NETWORK ENVIRONMENT

open access: yesAsia-Pacific Journal of Information Technology and Multimedia, 2018
Mobility management nowadays plays a critical role in delivering a seamless and quality service to millions of users worldwide and it is transparent from the user's involvement.
Farouk Abd. Jalin   +5 more
doaj   +1 more source

An agent-based dynamic information network for supply chain management [PDF]

open access: yes, 2004
One of the main research issues in supply chain management is to improve the global efficiency of supply chains. However, the improvement efforts often fail because supply chains are complex, are subject to frequent changes, and collaboration and ...
Ahn, H, Lee, H
core   +2 more sources

Multi-Party Trust Computation in Decentralized Environments [PDF]

open access: yes, 2012
In this paper, we describe a decentralized privacy-preserving protocol for securely casting trust ratings in distributed reputation systems. Our protocol allows n participants to cast their votes in a way that preserves the privacy of individual values ...
Dimitriou, T.   +3 more
core   +1 more source

A social relationship-based energy efficient routing scheme for Opportunistic Internet of Things

open access: yesICT Express, 2023
Opportunistic Internet of Things (OppIoT) combines Opportunistic Networks and the Internet of Things to provide opportunistic communication between IoT devices and human-created communities in order to improve network connectivity, reliability, and ...
Rani, Amita Malik
doaj   +1 more source

Continuous variable entanglement distillation of Non-Gaussian Mixed States [PDF]

open access: yes, 2009
Many different quantum information communication protocols such as teleportation, dense coding and entanglement based quantum key distribution are based on the faithful transmission of entanglement between distant location in an optical network.
A. Buchleitner   +11 more
core   +3 more sources

Modeling and Performance Analysis of Route-Over and Mesh-Under Routing Schemes in 6LoWPAN under Error-Prone Channel Condition

open access: yesJournal of Applied Mathematics, 2013
6LoWPAN technology has attracted extensive attention recently. It is because 6LoWPAN is one of Internet of Things standard and it adapts to IPv6 protocol stack over low-rate wireless personal area network, such as IEEE 802.15.4.
Tsung-Han Lee   +4 more
doaj   +1 more source

New Method of Measuring TCP Performance of IP Network using Bio-computing

open access: yes, 2012
The measurement of performance of Internet Protocol IP network can be done by Transmission Control Protocol TCP because it guarantees send data from one end of the connection actually gets to the other end and in the same order it was send, otherwise an ...
Abdul-Rahman, Suha Adham   +1 more
core   +2 more sources

A comprehensive survey of the current trends and extensions for the proxy mobile IPv6 protocol [PDF]

open access: yes, 2015
Network based mobility management has attracted significant research interest due to its salient feature of relieving mobile nodes from participating in the mobility process.
Abdul Hamid, Nor Asilah Wati   +3 more
core   +1 more source

Rational Fair Consensus in the GOSSIP Model

open access: yes, 2017
The \emph{rational fair consensus problem} can be informally defined as follows. Consider a network of $n$ (selfish) \emph{rational agents}, each of them initially supporting a \emph{color} chosen from a finite set $ \Sigma$.
Clementi, Andrea   +3 more
core   +1 more source

LAMAN: Load Adaptable MAC for Ad Hoc Networks

open access: yesEURASIP Journal on Advances in Signal Processing, 2005
In mobile ad hoc radio networks, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency. In this paper, the load adaptable medium access control for ad hoc networks (LAMAN) protocol is described ...
Realp Marc, Pérez-Neira Ana I
doaj   +1 more source

Home - About - Disclaimer - Privacy