258 views198 votes14 years 10 months ago PPNA 2011»
A successful P2P live streaming system must achieve high uploading bandwidth utilization, fast stream distribution, fair aggregate bandwidth distribution among participating nodes,...
120 views122 votes15 years 10 months ago WIKIS 2009»
This exploratory study investigates the bipartite network of articles linked by common editors in Wikipedia, ‘The Free Encyclopedia that Anyone Can Edit’. We use the articles ...
168 views126 votes15 years 10 months ago ICC 2008»
— Wireless Sensor Networks (WSNs) are generally used for harsh environments involving military surveillance, emergency response, and habitat monitoring. Due to severe resource co...
—This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number ...
158 views140 votes15 years 9 months ago ICCCN 2007»
—Motivated by the fact that most of the existing QoS service composition solutions have limited scalability, we develop a hierarchical-based solution framework to achieve scalabi...
Increasing traffic and the necessity of stateful analyses impose strong computational requirements on network intrusion detection systems (NIDS), and motivate the need of distrib...
147 views106 votes15 years 9 months ago E2EMON 2006»
— Threshold crossing alerts (TCAs) indicate to a management system that a management variable, associated with the state, performance or health of the network, has crossed a cert...
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
150 views120 votes15 years 5 months ago DCOSS 2008»
Sensor networks can be viewed as large distributed databases, and SQL-like high-level declarative languages can be used for data and information retrieval. Energy constraints make ...
—In sensor networks, both energy and bandwidth are scarce resources. In the past, many energy efficient routing algorithms have been devised in order to maximize network lifetim...