Sciweavers

433 search results - page 16 / 87
» Networks and our Limited Information Horizon
Sort
View
JNW
2008
126views more  JNW 2008»
14 years 9 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
TON
2010
97views more  TON 2010»
14 years 4 months ago
Gradually reconfiguring virtual network topologies based on estimated traffic matrices
Traffic matrix, which is required as an input of traffic engineering (TE) methods, is difficult to be obtained directly. One possible approach to obtaining the traffic matrix is to...
Yuichi Ohsita, Takashi Miyamura, Shin'ichi Arakawa...
JSAC
2006
108views more  JSAC 2006»
14 years 9 months ago
Distributed Nonlinear Integer Optimization for Data-Optical Internetworking
Abstract--We present a novel approach for joint optical network provisioning and Internet protocol (IP) traffic engineering, in which the IP and optical networks collaboratively op...
Anwar Elwalid, Debasis Mitra, Qiong Wang
INFOCOM
2002
IEEE
15 years 2 months ago
Efficient Dissemination of Personalized Information Using Content-Based Multicast
There has been a surge of interest in the delivery of personalized information to users (e.g. personalized stocks or travel information), particularly as mobile users with limited ...
Rahul Shah, Ravi Jain, Farooq Anjum
MDM
2004
Springer
130views Communications» more  MDM 2004»
15 years 3 months ago
Opportunistic Resource Exchange in Inter-Vehicle Ad-Hoc Networks
In this paper we examine resource discovery in inter-vehicle ad-hoc networks in an urban area, where moving vehicles communicate with each other via short-range wireless transmiss...
Bo Xu, Aris M. Ouksel, Ouri Wolfson