Sciweavers

51 search results - page 10 / 11
» Periodic and Aperiodic Communication Techniques for Responsi...
Sort
View
SENSYS
2004
ACM
13 years 11 months ago
The flooding time synchronization protocol
Wireless sensor network applications, similarly to other distributed systems, often require a scalable time synchronization service enabling data consistency and coordination. Thi...
Miklós Maróti, Branislav Kusy, Gyula...
PEWASUN
2008
ACM
13 years 7 months ago
Experimentation and performance evaluation of rate adaptation algorithms in wireless mesh networks
In this paper we present an experimental study conducted in 802.11based mesh networks of three existing rate adaptation algorithms. The aim of this study is twofold. On the one ha...
Emilio Ancillotti, Raffaele Bruno, Marco Conti
USENIX
1994
13 years 7 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 6 months ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov
SIGCOMM
2004
ACM
13 years 11 months ago
Locating internet routing instabilities
This paper presents a methodology for identifying the autonomous system (or systems) responsible when a routing change is observed and propagated by BGP. The origin of such a rout...
Anja Feldmann, Olaf Maennel, Zhuoqing Morley Mao, ...