Sciweavers

164 search results - page 20 / 33
» Bootstrapping of Peer-to-Peer Networks
Sort
View
PERCOM
2007
ACM
15 years 9 months ago
Structural Learning of Activities from Sparse Datasets
Abstract. A major challenge in pervasive computing is to learn activity patterns, such as bathing and cleaning from sensor data. Typical sensor deployments generate sparse datasets...
Fahd Albinali, Nigel Davies, Adrian Friday
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
15 years 4 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
74
Voted
KDD
2010
ACM
327views Data Mining» more  KDD 2010»
15 years 1 months ago
Cold start link prediction
In the traditional link prediction problem, a snapshot of a social network is used as a starting point to predict, by means of graph-theoretic measures, the links that are likely ...
Vincent Leroy, Berkant Barla Cambazoglu, Francesco...
ARCS
2005
Springer
15 years 3 months ago
Towards Autonomic Networking Using Overlay Routing Techniques
With an ever-growing number of computers being embedded into our surroundings, the era of ubiquitous computing is approaching fast. However, as the number of networked devices incr...
Kendy Kutzner, Curt Cramer, Thomas Fuhrmann
ICNP
2003
IEEE
15 years 2 months ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...