Sciweavers

243 search results - page 34 / 49
» Communication under Strong Asynchronism
Sort
View
89
Voted
INFOCOM
2007
IEEE
15 years 6 months ago
Detecting Phantom Nodes in Wireless Sensor Networks
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
Joengmin Hwang, Tian He, Yongdae Kim
WADS
2007
Springer
96views Algorithms» more  WADS 2007»
15 years 6 months ago
Initializing Sensor Networks of Non-uniform Density in the Weak Sensor Model
Abstract. Assumptions about node density in the Sensor Networks literature are frequently too strong or too weak. Neither absolutely arbitrary nor uniform deployment seem feasible ...
Martin Farach-Colton, Miguel A. Mosteiro
INFOCOM
2003
IEEE
15 years 5 months ago
Sampling Biases in IP Topology Measurements
— Considerable attention has been focused on the properties of graphs derived from Internet measurements. Router-level topologies collected via traceroute-like methods have led s...
Anukool Lakhina, John W. Byers, Mark Crovella, Pen...
INFOCOM
1997
IEEE
15 years 4 months ago
Exploiting the Temporal Structure of MPEG Video for the Reduction of Bandwidth Requirements
We propose a new bandwidth allocation scheme for VBR video tra c in ATM networks. The scheme is tailored to MPEG-coded video sources that require stringent and deterministic quali...
Marwan Krunz, Satish K. Tripathi
NGC
2000
Springer
115views Communications» more  NGC 2000»
15 years 4 months ago
Hierarchical reliable multicast
The use of proxies for local error recovery and congestion control is a scalable technique used to overcome a number of wellknown problems in Reliable Multicast (RM). The idea is ...
Athina Markopoulou, Fouad A. Tobagi