Filters








3,174 Hits in 6.3 sec

News Briefs

1997 Journal of Research of the National Institute of Standards and Technology  
News Briefs NIST plans to host a conference in the near future where scientists and plastics industry representatives will discuss setting up a research consortium to further study nanocomposite flame  ...  The interlock method permits synchronization to within about 1 ms over long network paths and to within about 100 ms over short paths.  ...  Topics: Network security primer, network security techniques, INFOSEC education programs' training standards, network solutions, and annual FISSEA speak out.  ... 
doi:10.6028/jres.102.049 fatcat:iwdhjfefgrhfbkc5a3a5kbwwv4

News Briefs

1998 Journal of Research of the National Institute of Standards and Technology  
One significant benefit of an open architecture is the use of commodity PC components News Briefs and the ability to easily network the controller with the York company's Windows 95 office PCs.  ...  The DSM-CC protocol controls and manages the displaying of MPEG2 streams, the encoded moving pictures and audio bit streams compressed for storage and transporting over networks.  ...  They also emphasized their efforts in developing computing and communication architectures to enable efficient utilization of machine tool performance data and the repository.  ... 
doi:10.6028/jres.103.036 fatcat:pbr2y55krfh75e67yu4xf63jnu

Towards the european strategy for particle physics: The briefing book

T. Åkesson, R. Aleksan, B. Allanach, S. Bertolucci, A. Blondel, J. Butterworth, M. Cavalli-Sforza, A. Cervera, M. de Naurois, K. Desch, U. Egede, R. Heuer (+15 others)
2007 European Physical Journal C: Particles and Fields  
This document was prepared as part of the briefing material for the Workshop of the CERN Council Strategy Group, held in DESY Zeuthen from 2nd to 6th May 2006.  ...  material presented and discussed during the Symposium on the European Strategy for Particle Physics, held in Orsay from 30th January to 2nd February 2006, reflecting the various opinions of the European community  ...  An ongoing transfer is the Network-Emulator technology used to evaluate the performance of applications running over the Grid.  ... 
doi:10.1140/epjc/s10052-007-0318-3 fatcat:u54ydvn4s5dvfgrrowi7a4huby

Research Pathway towards MAC Protocol in Enhancing Network Performance in Wireless Sensor Network (WSN)

Anitha K, Usha S
2017 International Journal of Advanced Computer Science and Applications  
This protocol is mainly meant for sharing resources over the same channels by a large number of sensors not impacting the network performance in the negative sense.  ...  .  Medium Access: The nodes are controlled to participate in the communication process at any instances of time.  ...  [30] presented the secure/time synchronized and efficiency enhancement using the improved IHMAC. The outcomes are validated for enhanced efficiency.  ... 
doi:10.14569/ijacsa.2017.080706 fatcat:jpk7yqbmvze47ha2f5stxkhdee

PROMISE UNFULFILLED: A Brief History of Educational Wargaming in the Marine Corps

Sebastian J. Bae, Ian T. Brown
2021 MCU Journal  
The referee announces the outcome and the next move occurs.  ...  This is commonly referred to in the wargaming community as "The Road to War" brief. 24 Walt Yates argues that, in most wargames, the Road to War brief does not receive adequate effort and emphasis.  ...  All these players are in a tug-of-war in Kosovo over both the terrain and the civilian populace.  ... 
doi:10.21140/mcuj.20211202002 fatcat:ky5pgd2z5nb77fsytqkngolqdq

Bodyless Block Propagation: TPS Fully Scalable Blockchain with Pre-Validation [article]

Chonghe Zhao, Shengli Zhang, Taotao Wang, Soung Chang Liew
2022 arXiv   pre-print
This paper puts forth a transaction selection, ordering, and synchronization algorithm to drive the nodes to reach such a consensus.  ...  This paper further puts forth an algorithm to deal with such unresolvable transactions for an overall consistent and TPS-efficient scheme.  ...  With a perfectly synchronized PPBs, only the header of the newly mined block needs to be transmitted.  ... 
arXiv:2204.08769v1 fatcat:ziwsnhcmvredzlexyoaa7x63ou

The Second Named Data Networking Community Meeting (NDNcomm 2015)

Alexander Afanasyev, Yingi Yu, Lixia Zhang, Jeff Burke, kc claffy, Joshua Polterock
2016 Computer communication review  
This report is a brief summary of the second NDN Community Meeting held at UCLA in Los Angeles, California on September 28-29, 2015.  ...  for the attendees from 49 institutions across 13 countries to exchange their recent NDN research and development results, to debate existing and proposed functionality in NDN forwarding, routing, and security  ...  But NDN can enable secure and efficient communication and application development for a large range of applications, from very big to very small, and makes new applications possible and practical.  ... 
doi:10.1145/2875951.2875961 fatcat:4wamzw6cazb5jmyrn6abd24ybu

Quantum Key Distribution [article]

Philip Chan, Itzel Lucio-Martínez, Xiaofan Mo, Wolfgang Tittel
2011 arXiv   pre-print
We conclude the chapter with a brief discussion of quantum networks and future steps.  ...  First, we motivate the distribution of cryptographic keys based on quantum physical properties of light, give a brief introduction to QKD assuming the reader has no or very little knowledge about cryptography  ...  We conclude the chapter with a brief discussion of quantum networks and future steps. Motivation The importance of communication networks has increased significantly in the last three decades.  ... 
arXiv:1111.4501v1 fatcat:dgdg44x3undtbn7rqfvb4kuc3e

Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet

Edoardo Biagioni
2014 2014 47th Hawaii International Conference on System Sciences  
The decentralized model of security builds a flexible trust network on top of the social network of communicating individuals.  ...  We have started to leverage this capability to provide interpersonal communication both over infrastructure networks (the Internet), and over ad-hoc and delay-tolerant networks composed of the mobile devices  ...  . 1 To synchronize, any device with packets to send (a sender S) listens for announcements from other devices that wish to receive packets (receivers R).  ... 
doi:10.1109/hicss.2014.633 dblp:conf/hicss/Biagioni14 fatcat:24tqvubjn5hm3om77xk7wl4vwe

Security and Privacy Issues in Wireless Mesh Networks: A Survey [article]

Jaydip Sen
2013 arXiv   pre-print
This book chapter identifies various security threats in wireless mesh network (WMN).  ...  networks.  ...  and secure communication protocols for these networks.  ... 
arXiv:1302.0939v1 fatcat:4bxooy2dubeopa3qbcyg5yvi3y

The Road Towards 6G: A Comprehensive Survey [article]

Wei Jiang, Bin Han, Mohammad Asif Habibi, Hans Dieter Schotten
2021 arXiv   pre-print
At this crossroad, an overview of the current state of the art and a vision of future communications are definitely of interest.  ...  As of today, the fifth generation (5G) mobile communication system has been rolled out in many countries and the number of 5G subscribers already reaches a very large scale.  ...  For instance, mMTC types of communication services require lightweight security components while eMBB and URLLC types of communication services demand high efficient security schemes.  ... 
arXiv:2102.01420v1 fatcat:7pexxlo3pjfwlls6dl4lvh77iq

Quantum Key Distribution [chapter]

Philip Chan, Itzel Lucio-Martinez, Xiaofan Mo, Wolfgang Tittel
2011 Femtosecond-Scale Optics  
We conclude the chapter with a brief discussion of quantum networks and future steps. Motivation The importance of communication networks has increased significantly in the last three decades.  ...  As an ever-growing fraction of our daily activities (including e-mail and e-banking) now depends on communication over public channels such as optical fibers, the security of the exchange of sensitive  ... 
doi:10.5772/24468 fatcat:xb5bqhyilne5dgz5tebdzdt47e

Quantum Key Distribution [chapter]

M. Pivk
2010 Lecture Notes in Physics  
We conclude the chapter with a brief discussion of quantum networks and future steps. Motivation The importance of communication networks has increased significantly in the last three decades.  ...  As an ever-growing fraction of our daily activities (including e-mail and e-banking) now depends on communication over public channels such as optical fibers, the security of the exchange of sensitive  ... 
doi:10.1007/978-3-642-04831-9_3 fatcat:jpj5abpa5bbdxlewhhd6uselsy

A Decade of Research in Opportunistic Networks: Challenges, Relevance, and Future Directions

Sacha Trifunovic, Sylvia T. Kouyoumdjieva, Bernhard Distl, Ljubica Pajevic, Gunnar Karlsson, Bernhard Plattner
2017 IEEE Communications Magazine  
On the contrary, network-assisted D2D as defined by 3GPP allows operators to preserve their control over the network, however it raises privacy concerns as communicating devices are expected to reveal  ...  Brief Historic Overview In the dawn of opportunistic networks, researchers only had access to two widely deployed technologies: Wi-Fi in ad hoc mode, and Bluetooth.  ... 
doi:10.1109/mcom.2017.1500527cm fatcat:juxex7smqjhjvg4suvvcam6eiu

The Road Towards 6G: A Comprehensive Survey

Wei Jiang, Bin Han, Mohammad Asif Habibi, Hans Dieter Schotten
2021 IEEE Open Journal of the Communications Society  
At this crossroad, an overview of the current state of the art and a vision of future communications are definitely of interest.  ...  As of today, the fifth generation (5G) mobile communication system has been rolled out in many countries and the number of 5G subscribers already reaches a very large scale.  ...  For instance, mMTC types of communication services require lightweight security components while eMBB and URLLC types of communication services demand high efficient security schemes.  ... 
doi:10.1109/ojcoms.2021.3057679 fatcat:egt7bnw6x5a55kced2zw6j374y
« Previous Showing results 1 — 15 out of 3,174 results