Sciweavers

504 search results - page 78 / 101
» Distributed network storage service with quality-of-service ...
Sort
View
WINET
2002
144views more  WINET 2002»
15 years 26 days ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
COMCOM
2007
149views more  COMCOM 2007»
15 years 25 days ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
16 years 2 months ago
What's Different: Distributed, Continuous Monitoring of Duplicate-Resilient Aggregates on Data Streams
Emerging applications in sensor systems and network-wide IP traffic analysis present many technical challenges. They need distributed monitoring and continuous tracking of events....
Graham Cormode, S. Muthukrishnan, Wei Zhuang
IWCMC
2009
ACM
15 years 6 months ago
Cross-layer resource allocation scheme for multi-band high rate UWB systems
Abstract- In this paper, we investigate the use of a crosslayer allocation mechanism for the high-rate ultra-wideband (UWB) systems. The aim of this paper is twofold. First, throug...
Ayman Khalil, Matthieu Crussière, Jean-Fran...
NCA
2003
IEEE
15 years 6 months ago
Source-End DDoS Defense
A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the...
Jelena Mirkovic, Gregory Prier, Peter L. Reiher