Sciweavers

1551 search results - page 126 / 156
» Privacy-Preserving Network Aggregation
Sort
View
161 views 139 votes 15 years 10 months ago  QSHINE 2009»
Maximizing the aggregate network utility and minimizing the network energy consumption are important but conflict goals in wireless sensor networks. Challenges arise due to the app...
127 views 95 votes 15 years 10 months ago  COMSWARE 2007»
- Impact of random delays and losses in sensor networks manifests in the form of tardiness of data used for processing at the sink nodes. The age of data used by the end applicatio...
160 views 145 votes 15 years 5 months ago  IWCMC 2010»
Despite a large body of literature and methods devoted to the Traffic Matrix (TM) estimation problem, the inference of traffic flows volume from aggregated data still represents a ...
152 views 146 votes 15 years 7 months ago  APNOMS 2006»
Wireless sensor networks (WSNs) consist of a large collection of small nodes providing collaborative and distributed sensing ability in unpredictable environments. Given their unat...
153 views 111 votes 15 years 9 months ago  DMSN 2006»
Since data archiving in sensor networks is a communication intensive application, a careful power management of communication is of critical importance for such networks. An examp...
309 views 136 votes 16 years 13 days ago  CSCW 2010»
In this work we examine nine different sources for user similarity as reflected by activity in social media applications. We suggest a classification of these sources into three c...
112 views 108 votes 15 years 9 months ago  GRID 2004»
We present DiPerF, a distributed performance-testing framework, aimed at simplifying and automating service performance evaluation. DiPerF coordinates a pool of machines that test...
90 views 102 votes 15 years 8 months ago  IMC 2003»
By source-level IP packet burst, we mean several IP packets sent back-to-back from the source of a flow. We first identify several causes of source-level bursts, including TCP...
78 views 110 votes 15 years 7 months ago  PADS 1998»
In message passing environments, the message send time is dominated by overheads that are relatively independent of the message size. Therefore, fine-grained applications (such a...
136 views 137 votes 15 years 1 months ago  GAMESEC 2010»
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...