Sciweavers

1080 search results - page 47 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
CSSE
2006
IEEE
14 years 12 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
TWC
2011
367views more  TWC 2011»
14 years 6 months ago
Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
—In this paper, the performance of the ALOHA and CSMA MAC protocols are analyzed in spatially distributed wireless networks. The main system objective is correct reception of pac...
Mariam Kaynia, Nihar Jindal, Geir E. Øien
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
15 years 6 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
SIGMOD
2007
ACM
165views Database» more  SIGMOD 2007»
16 years 17 hour ago
Statistical analysis of sketch estimators
Sketching techniques can provide approximate answers to aggregate queries either for data-streaming or distributed computation. Small space summaries that have linearity propertie...
Florin Rusu, Alin Dobra
ICCCN
2007
IEEE
15 years 6 months ago
Evaluating Mobile Ad Hoc Networks: A Performance Index and Statistical Model
Abstract— This work is concerned with definining a performance index that can be used as an objective measure in the evaluation and comparison of ad hoc networking protocols. Sp...
Ikhlas Ajbar, Dmitri D. Perkins