Learn More
Network use has evolved to be dominated by content distribution and retrieval, while networking technology still speaks only of connections between hosts. Accessing content and services requires mapping from the <i>what</i> that users care about to the network's <i>where</i>. We present <i>Content-Centric Networking</i> (CCN) which treats content as a(More)
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without(More)
Spontaneous neuronal activity plays an important role in the development of cortical circuitry, yet its spatio-temporal dynamics are poorly understood. Cajal-Retzius (CR) neurons in developing layer 1 are necessary for correct cortical lamination and are strategically located to coordinate early circuit activity. To characterize the spontaneous activity of(More)
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without(More)
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without(More)
A variety of proposals call for a new Internet architecture focused on retrieving content by name, but it has not been clear that any of these approaches are general enough to support Internet applications like real-time streaming or email. We present a detailed description of a prototype implementation of one such application -- Voice over IP (VoIP) -- in(More)
Current networks derive their security from a communication model. The security of content is determined by who (what host) you retrieved that content from, and the properties of the communication channel over which you retrieved it-was it encrypted, authenticated, and so on. Such security is transient, evaporating after the connection ends, and not(More)
Security for mobile and wireless devices must be highly usable. Yet combining effective security and usability is often considered impossible. For example, deploying effective security for wireless networks is a difficult task, even for skilled systems administrators – a fact that is impeding the deployment of many mobile systems. In this paper we describe(More)