Sciweavers

Share
CN
2006
110views more  CN 2006»
9 years 2 months ago
Maximal lifetime scheduling for K to 1 sensor-target surveillance networks
This paper addresses the maximal lifetime scheduling for k to 1 sensor
Hai Liu, Peng-Jun Wan, Xiaohua Jia
CN
2006
89views more  CN 2006»
9 years 2 months ago
A flexible concast-based grouping service
Abstract. We present a scalable and flexible grouping service based on concast and best-effort single-source multicast. The service assigns participating end systems to specific gr...
Amit Sehgal, Kenneth L. Calvert, Jim Griffioen
CN
2006
88views more  CN 2006»
9 years 2 months ago
Benefits of advertising wavelength availability in distributed lightpath establishment
In this paper, we study the benefits of advertising wavelength availability in a distributed lightpath establishment environment by extensive simulations. Various cases with diffe...
Shu Shen, Gaoxi Xiao, Tee Hiang Cheng
CN
2006
83views more  CN 2006»
9 years 2 months ago
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
This paper presents an assessment of the communication overheads of IPsec and evaluates the feasibility of deploying it on handheld devices for the UMTS architecture. A wide range...
Christos Xenakis, Nikolaos Laoutaris, Lazaros F. M...
CN
2006
109views more  CN 2006»
9 years 2 months ago
Quality of service provisioning for composable routing elements
Quality of service (QoS) provisioning for dynamically composable software elements in a programmable router has not received much attention. We present a router platform that supp...
Seung Chul Han, Puneet Zaroo, David K. Y. Yau, Yu ...
CN
2006
166views more  CN 2006»
9 years 2 months ago
GLR: A novel geographic routing scheme for large wireless ad hoc networks
Wireless ad hoc routing has been extensively studied and many clever schemes have been proposed over the last several years. One class of ad hoc routing is geographic routing wher...
Jongkeun Na, Chong-kwon Kim
CN
2006
66views more  CN 2006»
9 years 2 months ago
Secure acknowledgment aggregation and multisignatures with limited robustness
In certain reliable group-oriented and multicast applications, a source needs to securely verify whether all (and if not all, which) intended receivers have received a message. How...
Claude Castelluccia, Stanislaw Jarecki, Jihye Kim,...
CN
2006
85views more  CN 2006»
9 years 2 months ago
An efficient heuristic for selecting active nodes in wireless sensor networks
Energy saving is a paramount concern in wireless sensor networks (WSNs). A strategy for energy saving is to cleverly manage the duty cycle of sensors, by dynamically activating di...
Flávia Coimbra Delicato, Fábio Prott...
CN
2006
68views more  CN 2006»
9 years 2 months ago
Fast packet classification for two-dimensional conflict-free filters
Florin Baboescu, Priyank Ramesh Warkhede, Subhash ...
CN
2006
56views more  CN 2006»
9 years 2 months ago
Maximizing remote work in flooding-based peer-to-peer systems
In peer-to-peer (P2P) systems where individual peers must cooperate to process each other's requests, a useful metric for evaluating the system is how many remote requests ar...
Qixiang Sun, Neil Daswani, Hector Garcia-Molina
books