3,498 research outputs found

    Application Layer Active Networks.

    Get PDF

    Security Protocol for Active Networks.

    Get PDF

    An Improvement of Active Networks Using Wince

    Full text link
    Many theorists would agree that, had it not been for lambda calculus [19], the improvement of Scheme might never have occurred [6]. In this work, we confirm the evaluation of the memory bus, demonstrates the confirmed importance of steganography [8]. In order to solve this quagmire, we discover how IPv4 can be applied to the deployment of the Internet

    Transmission of Information in Active Networks

    Full text link
    Shannon's Capacity Theorem is the main concept behind the Theory of Communication. It says that if the amount of information contained in a signal is smaller than the channel capacity of a physical media of communication, it can be transmitted with arbitrarily small probability of error. This theorem is usually applicable to ideal channels of communication in which the information to be transmitted does not alter the passive characteristics of the channel that basically tries to reproduce the source of information. For an {\it active channel}, a network formed by elements that are dynamical systems (such as neurons, chaotic or periodic oscillators), it is unclear if such theorem is applicable, once an active channel can adapt to the input of a signal, altering its capacity. To shed light into this matter, we show, among other results, how to calculate the information capacity of an active channel of communication. Then, we show that the {\it channel capacity} depends on whether the active channel is self-excitable or not and that, contrary to a current belief, desynchronization can provide an environment in which large amounts of information can be transmitted in a channel that is self-excitable. An interesting case of a self-excitable active channel is a network of electrically connected Hindmarsh-Rose chaotic neurons.Comment: 15 pages, 5 figures. submitted for publication. to appear in Phys. Rev.

    ROSA: Realistic Open Security Architecture for active networks

    Get PDF
    Proceedings of IFIP-TC6 4th International Working Conference, IWAN 2002 Zurich, Switzerland, December 4–6, 2002.Active network technology enables fast deployment of new network services tailored to the specific needs of end users, among other features. Nevertheless, security is still a main concern when considering the industrial adoption of this technology. In this article we describe an open security architecture for active network platforms that follow the discrete approach. The proposed solution provides all the required security features, and it also grants proper scalability of the overall system, by using a distributed key-generation algorithm. The performance of the proposal is validated with experimental data obtained from a prototype implementation of the solution.Publicad
    • …
    corecore