143 views130 votes15 years 8 months ago DCOSS 2005»
The widespread dissemination of small-scale sensor nodes has sparked interest in a powerful new database abstraction for sensor networks: Clients “program” the sensors through ...
Abstract— Aggregation of individual wavelengths into wavebands for their subsequent switching and routing as a single group is an attractive way for scalable and cost-efficient ...
163 views104 votes15 years 8 months ago FIDJI 2003»
– This paper presents a Java service platform for mobile healthcare that enables remote health monitoring using 2.5/3G public wireless networks. The platform complies with today...
89 views124 votes15 years 7 months ago ICPPW 1999»
Location management is an essential service in mobile networks. It provides mechanisms for recording and querying location of mobile units in the network. This is needed for estab...
172 views143 votes15 years 7 months ago ECMAST 1997»
This paper introduces a multicast based architecture for supporting large scale Collaborative Virtual Environments (CVEs). The paper begins by defining CVEs, discussing the motivat...
108 views112 votes15 years 6 months ago DSOM 2006»
This paper proposes an open, extensible control plane for a global event service, based on semantically rich messages. This is based on the novel application of control plane separ...
— Despite the automation in many domains, network management still requires a lot of manual interaction. With the ongoing rapid growth of the Internet and the number of connected...
162 views121 votes15 years 4 months ago ONDM 2007»
WDM technology has increased network link capacity dramatically, moving the network bottleneck from the transport to the routing layer. Hybrid electro-optical architectures seem at...
116 views115 votes15 years 3 months ago CORR 2008»
Hierarchical cooperation has recently been shown to achieve better throughput scaling than classical multihop schemes in static wireless networks. However, the end-to-end delay of ...
—Physical layer secrecy in wireless networks in the presence of eavesdroppers of unknown location is considered. In contrast to prior schemes, which have expended energy in the f...