Sciweavers

6110 search results - page 204 / 1222
» Graceful Network Operations
Sort
View
ICS
2010
Tsinghua U.
16 years 2 months ago
Local Algorithms for Finding Interesting Individuals in Large Networks
: We initiate the study of local, sublinear time algorithms for finding vertices with extreme topological properties -- such as high degree or clustering coefficient -- in large so...
Mickey Brautbar, Michael Kearns
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
15 years 11 months ago
Dynamic Address Allocation for Management and Control in Wireless Sensor Networks
Several data-centric communication paradigms have been proposed in the domain of wireless sensor networks (WSN). Therefore, the principles of operation and maintenance in such net...
Zheng Yao, Falko Dressler
TACS
2001
Springer
15 years 9 months ago
The UDP Calculus: Rigorous Semantics for Real Networking
Network programming is notoriously hard to understand: one has to deal with a variety of protocols (IP, ICMP, UDP, TCP etc), concurrency, packet loss, host failure, timeouts, the c...
Andrei Serjantov, Peter Sewell, Keith Wansbrough
AINA
2004
IEEE
15 years 8 months ago
ZBP: A Zone-based Broadcasting Protocol for Wireless Sensor Networks
Abstract. Wireless Sensor Networks (WSNs) have been widely used in motoring and collecting interests of environment information. Packet flooding or broadcasting is an essential fun...
Chih-Yung Chang, Kuei-Ping Shih, Shih-Chieh Lee
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 8 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena