Link analysis is a critical component of current Internet search engines' results ranking software, which determines the ordering of query results returned to the user. The o...
This paper presents a distributed user authentication scheme in wireless sensor networks. Our scheme is based on the self-certified keys cryptosystem (SCK), and we have modified i...
Epidemic protocols such as gossip have proven to have many desirable properties for information sharing. However, trust is one of the issues that is yet to be examined with respec...
In this paper we propose a distributed, self organizing, robust and energy efficient data gathering algorithm for sensor networks operating in environments where all the sensor n...
Traditional security analyses are often geared towards cryptographic primitives or protocols. Although such analyses are absolutely necessary, they do not provide much insight for...
Congestion control for compressed audio is a nontrivial pursuit. Audio perception is highly susceptible to disturbance in temporal quality. We recently proposed and implemented a ...
— In this paper, we propose an application-driven MAC-layer buffer management framework based on a novel Active Dropping (AD) mechanism for real-time video streaming in IEEE 802....
A broad range of industries must be able to seamlessly integrate control applications using sensors distributed in the real world and IT applications supporting various business a...
— Efficient searching is one of the important design issues in peer-to-peer (P2P) networks. Among various searching techniques, semantic-based searching has drawn significant a...