Sciweavers

5891 search results - page 1161 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
CCR
2002
112views more  CCR 2002»
14 years 9 months ago
New directions in traffic measurement and accounting
Accurate network traffic measurement is required for accounting, bandwidth provisioning and detecting DoS attacks. These applications see the traffic as a collection of flows they...
Cristian Estan, George Varghese
TON
2010
147views more  TON 2010»
14 years 8 months ago
Coverage-time optimization for clustered wireless sensor networks: a power-balancing approach
—In this paper, we investigate the maximization of the coverage time for a clustered wireless sensor network (WSN) by optimal balancing of power consumption among cluster heads (...
Tao Shu, Marwan Krunz
81
Voted
DEBU
2010
159views more  DEBU 2010»
14 years 7 months ago
Accelerating In-Page Logging with Non-Volatile Memory
A great deal of research has been done on solid-state storage media such as flash memory and non-volatile memory in the past few years. While NAND-type flash memory is now being c...
Sang-Won Lee, Bongki Moon, Chanik Park, Joo Young ...
CORR
2011
Springer
243views Education» more  CORR 2011»
14 years 4 months ago
Deterministic Network Model Revisited: An Algebraic Network Coding Approach
Abstract—The capacity of multiuser networks has been a longstanding problem in information theory. Recently, Avestimehr et al. have proposed a deterministic network model to appr...
MinJi Kim, Elona Erez, Edmund M. Yeh, Muriel M&eac...
WWW
2011
ACM
14 years 4 months ago
Estimating sizes of social networks via biased sampling
Online social networks have become very popular in recent years and their number of users is already measured in many hundreds of millions. For various commercial and sociological...
Liran Katzir, Edo Liberty, Oren Somekh
« Prev « First page 1161 / 1179 Last » Next »