Login / Signup
Protocol pruning.
David Lee
Arun N. Netravali
Krishan K. Sabnani
Published in:
Proc. IEEE (1995)
Keyphrases
</>
pruning method
communication protocol
neural network
lightweight
authentication protocol
application layer
pruning algorithm
cryptographic protocols
file transfer
database systems
cooperative
information systems
security protocols
genetic algorithm
tree construction
databases
network protocols
tree pruning