Sciweavers

27 search results - page 2 / 6
» Deployment of a Reinforcement Backbone Network with Constrai...
Sort
View
INFOCOM
2006
IEEE
13 years 11 months ago
Capacity-Constrained Design of Resilient Multi-Tier Wireless Mesh Networks
nts etc.), an abstract graph of the deployment area and QoS constraints to generate appropriate logical topologies. WIND starts with the set of network elements to be deployed (Nod...
R. Raghuraman, Sridhar Iyer
INFOCOM
2003
IEEE
13 years 10 months ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin
PUC
2008
137views more  PUC 2008»
13 years 4 months ago
Middleware support for the deployment of ubiquitous software components
A number of emerging distributed platforms include xed and robust workstations but, like dynamic and pervasive networks, are often built from mobile and resource-constrained device...
Didier Hoareau, Yves Mahéo
SASN
2005
ACM
13 years 10 months ago
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Rec...
Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi ...
INFOCOM
2002
IEEE
13 years 10 months ago
ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies.
—Advances in microsensor and radio technology will enable small but smart sensors to be deployed for a wide range of environmental monitoring applications. The low per-node cost ...
Alberto Cerpa, Deborah Estrin