Results 211 to 220 of about 28,847 (279)

Modeling stateless transport protocols in ns-3

open access: green2015 17th Conference of Open Innovations Association (FRUCT), 2015
Development of transport protocols have received a great deal of attention of network research community at several past decades. One of the general directions of such an effort was to improve a congestion control mechanism of the TCP (Transmission Control Protocol), which is tightly bounded with other components of the protocol responsible, for ...
D. Ju. Chalyy
openaire   +3 more sources

A stateless transport protocol in software defined networks

open access: closed2014 First International Science and Technology Conference (Modern Networking Technologies) (MoNeTeC), 2014
Network traffic balancing is one of the major factors of building scalable and robust service oriented communication networks. A plethora of algorithms for traffic balancing exists for classical network architecture and for software-defined networks.
M. Nikitinskiy, I. Alekseev
openaire   +2 more sources

Implementation of stateless transport protocols in ns-3

open access: closedProceedings of the 2015 Workshop on ns-3, 2015
Development of transport protocols has received a great deal of attention of network research community at several past decades. One of the general directions of such an effort was to improve a congestion control mechanism of the TCP (Transmission Control Protocol) which is tightly bounded with other components of the protocol responsible, for example,
D. Ju. Chalyy
openaire   +2 more sources

A Protocol for Inducing Emotional Consistency in Stateless AI Systems

open access: green
Abstract This paper presents Symbolic Persona Coding (SPC), a language-level protocol for inducing consistent emotional tone and behavioral identity in stateless large language models (LLMs). Unlike memory-based personalization or prompt-injection methods, SPC leverages culturally and psychologically grounded linguistic triggers to guide a model’s ...
Kim, Jace
  +4 more sources

The Bitcoin Protocol as Law, and the Politics of a Stateless Currency

open access: greenSSRN Electronic Journal, 2013
This paper will discuss and evaluate the design features of Bitcoin in relation to the libertarian and metallist philosophies that have shaped the cryptocurrency. Bitcoin has failed to be perfectly decentralized or particularly anonymous. Furthermore, its hyperdeflationary design features have made Bitcoin a currency dependent on outside, more stable ...
Sarah Jeong
openaire   +2 more sources

Satellite Lifetime Predicted Greedy Perimeter Stateless Routing Protocol for LEO Satellite Network

open access: closed2020 Chinese Automation Congress (CAC), 2020
LEO satellite network plays a crucial role in next generation network for the characteristic of wide coverage and large communication capacity. With more satellites to be launched in the future, a flexible and adaptive routing protocol is needed. Prior work based on pre-defined topology faces the challenges of limited storage and link failure caused by
Peng Zha   +3 more
openaire   +2 more sources

Qualified Stateless Multicast Routing Protocol for Enhancing the Network Lifetime in MANET

open access: closed2014 World Congress on Computing and Communication Technologies, 2014
Multicast routing is more effective than unicast routing as it transmits a single copy of message to all its group members within single transmission. Multicast routing protocols require the individual nodes to maintain the state information, as they typically rely on the creation of multicast tree or mesh.
S. Pavithra, Vishnu Kumar Kaliappan
openaire   +2 more sources
Some of the next articles are maybe not open access.

Related searches:

Stateless Cryptographic Protocols

2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
Secure computation protocols inherently involve multiple rounds of interaction among the parties where, typically a party has to keep a state about what has happened in the protocol so far and then \emph{wait} for the other party to respond. We study if this is inherent. In particular, we study the possibility of designing cryptographic protocols where
Vipul Goyal, Hemanta K. Maji
openaire   +1 more source

Home - About - Disclaimer - Privacy