Sciweavers

1513 search results - page 44 / 303
» Fibonacci Correction Networks
Sort
View
128
Voted
IM
2007
15 years 5 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
INFOCOM
2009
IEEE
15 years 11 months ago
Time Slicing in Mobile TV Broadcast Networks with Arbitrary Channel Bit Rates
Abstract—Mobile TV networks have received significant attention from the industry and academia, as they have already been deployed in several countries and their expected market...
Cheng-Hsin Hsu, Mohamed Hefeeda
COLT
2007
Springer
15 years 10 months ago
Observational Learning in Random Networks
In the standard model of observational learning, n agents sequentially decide between two alternatives a or b, one of which is objectively superior. Their choice is based on a stoc...
Julian Lorenz, Martin Marciniszyn, Angelika Steger
CLEANDB
2006
ACM
185views Database» more  CLEANDB 2006»
15 years 10 months ago
In-network Outlier Cleaning for Data Collection in Sensor Networks
Outliers are very common in the environmental data monitored by a sensor network consisting of many inexpensive, low fidelity, and frequently failed sensors. The limited battery ...
Yongzhen Zhuang, Lei Chen 0002
DSN
2003
IEEE
15 years 9 months ago
Detection and Handling of MAC Layer Misbehavior in Wireless Networks
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish...
Pradeep Kyasanur, Nitin H. Vaidya