Sciweavers

1551 search results - page 141 / 156
» Privacy-Preserving Network Aggregation
Sort
View
108 views 112 votes 15 years 6 months ago  DSOM 2006»
This paper proposes an open, extensible control plane for a global event service, based on semantically rich messages. This is based on the novel application of control plane separ...
148 views 140 votes 15 years 4 months ago  IM 2007»
— Despite the automation in many domains, network management still requires a lot of manual interaction. With the ongoing rapid growth of the Internet and the number of connected...
162 views 121 votes 15 years 4 months ago  ONDM 2007»
WDM technology has increased network link capacity dramatically, moving the network bottleneck from the transport to the routing layer. Hybrid electro-optical architectures seem at...
116 views 115 votes 15 years 3 months ago  CORR 2008»
Hierarchical cooperation has recently been shown to achieve better throughput scaling than classical multihop schemes in static wireless networks. However, the end-to-end delay of ...
187 views 142 votes 13 years 5 months ago  INFOCOM 2012»
—Physical layer secrecy in wireless networks in the presence of eavesdroppers of unknown location is considered. In contrast to prior schemes, which have expended energy in the f...
147 views 119 votes 15 years 9 months ago  ADHOCNETS 2009»
Node clustering and data aggregation are popular techniques to reduce energy consumption in large WSNs and a large body of literature has emerged describing various clustering prot...
113 views 90 votes 15 years 9 months ago  ICC 2007»
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
116 views 110 votes 15 years 9 months ago  ICPP 2007»
In this paper, a novel packet classification scheme optimized for multi-core network processors is proposed. The algorithm, Explicit Cuttings (ExpCuts), adopts a hierarchical spac...
143 views 141 votes 15 years 8 months ago  FSKD 2005»
Core operations (e.g. TDMA scheduler, synchronized sleep period, data aggregation) of many proposed protocols for different layer of sensor network necessitate clock synchronizatio...
115 views 117 votes 15 years 8 months ago  ATAL 2003»
Abstract. We are developing a decentralized approach to trust based on referral systems, where agents adaptively give referrals to one another to find other trustworthy agents. In...