Sciweavers

1256 search results - page 100 / 252
» A Simple E-Voting Protocol
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 11 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
TSP
2010
14 years 11 months ago
Statistical detection of congestion in routers
Detection of congestion plays a key role in numerous networking protocols, including those driving Active Queue Management (AQM) methods used in congestion control in Internet rout...
Ivan D. Barrera, Stephan Bohacek, Gonzalo R. Arce
TWC
2010
14 years 11 months ago
Cellular Systems with Non-Regenerative Relaying and Cooperative Base Stations
In this paper, the performance of cellular networks with joint multicell processing and dedicated relay terminals is investigated. It is assumed that each relay terminal is capable...
Oren Somekh, Osvaldo Simeone, Harold Vincent Poor,...
INFOCOM
2011
IEEE
14 years 8 months ago
Feasibility and optimization of delay guarantees for non-homogeneous flows in IEEE 802.11 WLANs
—Due to the rapid growth of real-time applications and the ubiquity of IEEE 802.11 MAC as a layer-2 protocol for wireless local area networks (WLANs), it is of increasing interes...
Yan Gao, Chee Wei Tan, Ying Huang, Zheng Zeng, P. ...
INFOCOM
2011
IEEE
14 years 8 months ago
Approximate distance queries and compact routing in sparse graphs
—An approximate distance query data structure is a compact representation of a graph, and can be queried to approximate shortest paths between any pair of vertices. Any such data...
Rachit Agarwal, Philip Brighten Godfrey, Sariel Ha...