Sciweavers

1874 search results - page 246 / 375
» Network optimization for DHT-based applications
Sort
View
123
Voted
IPCCC
2005
IEEE
15 years 9 months ago
Key management in wireless ad hoc networks: collusion analysis and prevention
Due to the dynamic nature of WAHN communications and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure c...
Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Elto...
128
Voted
ICANN
1997
Springer
15 years 7 months ago
Topology Representing Networks for Intrinsic Dimensionality Estimation
Abstract. In this paper we compare two methods for intrinsic dimensionality (ID) estimation based on optimally topology preserving maps (OTPMs). The rst one is a direct approach, w...
Jörg Bruske, Gerald Sommer
131
Voted
DASFAA
2008
IEEE
156views Database» more  DASFAA 2008»
15 years 3 months ago
Load Balancing for Moving Object Management in a P2P Network
Abstract. Online games and location-based services now form the potential application domains for the P2P paradigm. In P2P systems, balancing the workload is essential for overall ...
Mohammed Eunus Ali, Egemen Tanin, Rui Zhang, Lars ...
120
Voted
CORR
2008
Springer
125views Education» more  CORR 2008»
15 years 3 months ago
Power Control in Cognitive Radio Networks: How to Cross a Multi-Lane Highway
Abstract--We consider power control in cognitive radio networks where secondary users identify and exploit instantaneous and local spectrum opportunities without causing unacceptab...
Wei Ren, Qing Zhao, Ananthram Swami
132
Voted
TPDS
2008
136views more  TPDS 2008»
15 years 3 months ago
Data Gathering with Tunable Compression in Sensor Networks
We study the problem of constructing a data gathering tree over a wireless sensor network in order to minimize the total energy for compressing and transporting information from a ...
Yang Yu, Bhaskar Krishnamachari, Viktor K. Prasann...