Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Abstract— In this paper, we propose an incentive system to stimulate the nodes’ cooperation in multi-hop wireless networks. Reducing the number and the size of the payment rece...
Abstract--Cognitive radio networks require fast and reliable spectrum sensing to achieve high network utilization by secondary users. Current optimization approaches to spectrum se...
132 views137 votes15 years 9 months ago WASA 2009»
Abstract. This paper is motivated by exploring the impact of the number of channels on the achievable communication latency for a specific communication task. We focus on how to u...
93 views130 votes15 years 9 months ago ICDCS 2007»
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...
149 views133 votes15 years 9 months ago ICMCS 2006»
In this paper, we proposed to setup a distributed multimedia system which aggregates the capacity of multiple servers to provide customized multimedia services in a cost-effective...
Email triage is the process of going through unhandled email and deciding what to do with it. This process can quickly become a serious problem for users with large volumes of ema...
117 views107 votes15 years 8 months ago CIKM 2005»
In this paper, we propose a novel energy-efficient approach, a localized routing tree (LRT) coupled with a route redirection (RR) strategy, to support various types of queries. LR...
139 views123 votes15 years 8 months ago EVOW 2005»
We present a novel camera network design methodology based on the Parisian approach to evolutionary computation. The problem is partitioned into a set of homogeneous elements, whos...
106 views108 votes15 years 8 months ago ICESS 2004»
A new gradient-based routing protocol is proposed in this paper. It takes into account the minimum hop count and remaining energy of each node while relaying data from source node ...