Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Samuel C. Nelson"'
Autor:
Oh-Ryeong Ha, Haley J. Killian, Ann M. Davis, Seung-Lark Lim, Jared M. Bruce, Jarrod J. Sotos, Samuel C. Nelson, Amanda S. Bruce
Publikováno v:
Frontiers in Psychology, Vol 11 (2020)
Children are vulnerable to adverse effects of food advertising. Food commercials are known to increase hedonic, taste-oriented, and unhealthy food decisions. The current study examined how promoting resilience to food commercials impacted susceptibil
Externí odkaz:
https://doaj.org/article/e196d3a43c5744659051bed029975012
Autor:
Bryan Tedesco, Joud Khoury, Armando Caro, Kolia Sadeghi, Tim Strayer, Vikas Kawadia, Wayne Phoel, Dorene Ryder, Michael Matthews, Samuel C. Nelson, Olivia DeRosa, Philip Lundrigan, Jake Kurzer, Carsten Clark, Keith Gremban
Publikováno v:
Computer Networks. 144:1-16
Current networking technologies are ill-suited for content sharing in emerging military and first-responder networks where fixed infrastructures and stable connectivity cannot be assumed. New paradigms, in particular content-based networking, is prov
Autor:
Stephane Blais, Bishal Thapa, Stephen Lawrence, Tim Strayer, Daniel Ellard, Regina Rosales Hain, Michael J. Beckerle, Vlad Shurbanov, Karen Zita Haigh, Colleen T. Rock, Armando Caro, Daniel Alan Coffin, Michael Atighetchi, Emily Do, Ram Ramanathan, Will Tetteh, Samuel C. Nelson, Scott Loos, Aaron Adler
Publikováno v:
ICNC
New airborne communication technologies solve pressing capability requirements but often at the cost of cross-platform compatibility. We present an architecture and prototype constructed under the DARPA DyNAMO program specifically designed to address
Publikováno v:
MILCOM
Backpressure forwarding maximizes throughput in dynamic networks. It does not, however, provide any latency guarantees and can result in indefinitely long queuing delays. ASAP (Anti-Starvation with Artificial Packets)solves this starvation problem by
Publikováno v:
ICN
An approach to creating secure virtual private networks for the Named Data Networking (NDN) protocol suite is described. It encrypts and encapsulates NDN packets from higher security domains and places them as the payload in unencrypted NDN packets,
Publikováno v:
GLOBECOM Workshops
Large underwater sensing arrays use acoustic communications links over long distances (several km) to coordinate the activities of multiple sensors. Acoustic links have low bandwidths and long propagation delays, making them a hostile environment for
Publikováno v:
ACM SIGMOBILE Mobile Computing and Communications Review. 13:56-59
Current work in routing protocols for delay and disruption tolerant networks leverage epidemic-style algorithms that trade off injecting many copies of messages into the network for increased probability of message delivery. However, such techniques
Publikováno v:
2014 IEEE Military Communications Conference.
Tactical content-based networks provide high military utility in dynamic mobile networks with intermittent connectivity and inherent disruption. Protecting the confidentiality of information exchanges (content and metadata) in such networks is partic
Publikováno v:
MASS
Real world MANETs often exhibit an inherent community structure in their topological connectivity and in the evolution of the topology over time. Such temporal community structure of MANETs has been shown to be extremely useful in improving the perfo
Publikováno v:
2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN).