Sciweavers

154 search results - page 29 / 31
» Analyzing and modeling encryption overhead for sensor networ...
Sort
View
INFOCOM
2005
IEEE
13 years 12 months ago
Gossip algorithms: design, analysis and applications
Abstract— Motivated by applications to sensor, peer-topeer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and...
Stephen P. Boyd, Arpita Ghosh, Balaji Prabhakar, D...
MOBICOM
2000
ACM
13 years 10 months ago
Caching strategies in on-demand routing protocols for wireless ad hoc networks
An on-demand routing protocol for wireless ad hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a...
Yih-Chun Hu, David B. Johnson
SIGMETRICS
2008
ACM
142views Hardware» more  SIGMETRICS 2008»
13 years 6 months ago
Exploiting manufacturing variations for compensating environment-induced clock drift in time synchronization
Time synchronization is an essential service in distributed computing and control systems. It is used to enable tasks such as synchronized data sampling and accurate time-offlight...
Thomas Schmid, Zainul Charbiwala, Jonathan Friedma...
HICSS
2003
IEEE
92views Biometrics» more  HICSS 2003»
13 years 11 months ago
Distributed Energy-conserving Routing Protocols
This paper discusses several distributed poweraware routing protocols in wireless ad-hoc networks (especially sensor networks). We seek to optimize the lifetime of the network. We...
Qun Li, Javed A. Aslam, Daniela Rus
IPPS
2008
IEEE
14 years 20 days ago
Random choices for churn resilient load balancing in peer-to-peer networks
Peer-to-peer (P2P) networks based on consistent hashing functions have an inherent load uneven distribution problem. Things are even worse in unstructured P2P systems. The objecti...
Song Fu, Cheng-Zhong Xu, Haiying Shen