Sciweavers

3343 search results - page 308 / 669
» Network Objects
Sort
View
PE
2006
Springer
193views Optimization» more  PE 2006»
15 years 3 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
127
Voted
SIGMOD
2008
ACM
124views Database» more  SIGMOD 2008»
15 years 3 months ago
Scalable network distance browsing in spatial databases
An algorithm is presented for finding the k nearest neighbors in a spatial network in a best-first manner using network distance. The algorithm is based on precomputing the shorte...
Hanan Samet, Jagan Sankaranarayanan, Houman Alborz...
HIPC
2009
Springer
15 years 1 months ago
Improved opportunistic scheduling algorithms for WiMAX Mobile Multihop Relay networks
We investigate the problem of scheduling in OFDMbased multihop relay networks with special emphasis on IEEE 802.16j based WiMAX networks. In such networks, scheduling is the probl...
Srinath Narasimha, Krishna M. Sivalingam
KDD
2006
ACM
122views Data Mining» more  KDD 2006»
16 years 4 months ago
Measuring and extracting proximity in networks
Measuring distance or some other form of proximity between objects is a standard data mining tool. Connection subgraphs were recently proposed as a way to demonstrate proximity be...
Yehuda Koren, Stephen C. North, Chris Volinsky
PERCOM
2006
ACM
16 years 3 months ago
A Multi-Commodity Flow Approach for Globally Aware Routing in Multi-Hop Wireless Networks
Routing in multi-hop wireless networks is typically greedy, with every connection attempting to establish a path that minimizes its number of hops. However, interference plays a m...
Vinay Kolar, Nael B. Abu-Ghazaleh