Sciweavers

1551 search results - page 149 / 156
» Privacy-Preserving Network Aggregation
Sort
View
79 views 127 votes 15 years 2 months ago  COMCOM 2004»
In this paper, we propose a simple scheduler called SBQ (Service-Based Queuing) to share the bandwidth fairly between unicast and multicast flows according to a new definition of ...
188 views 126 votes 16 years 2 months ago  EWSN 2008»
In this paper3 , we use Bayesian Networks as a means for unsupervised learning and anomaly (event) detection in gas monitoring sensor networks for underground coal mines. We show t...
122 views 99 votes 15 years 8 months ago  SENSYS 2003»
Wireless sensor networks enable dense sensing of the environment, offering unprecedented opportunities for observing the physical world. Centralized data collection and analysis a...
94 views 136 votes 15 years 7 months ago  ICPPW 2002»
In large networks, maintaining precise global network state information is almost impossible. Many factors, such as non-negligible propagation delay, infrequent state updates due ...
80 views 97 votes 15 years 3 months ago  CN 2006»
Expedited Forwarding (EF) is a service defined under the Differentiated Services framework. Based on its recently revised definition in IETF RFC 3246, Packet Scale Rate Guarantee ...
156 views 149 votes 15 years 2 months ago  PSYCHNOLOGY 2008»
Visualization plays an important role in social networks analysis to explore and investigate individual and groups behaviours. Therefore, different approaches have been proposed f...
137 views 145 votes 14 years 10 months ago  JSAC 2011»
—Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause...
146 views 160 votes 15 years 9 months ago  GLOBECOM 2006»
— Key predistribution is a popular technique for key distribution in sensor networks. The schemes available in current literature using this approach are for nodes with no or lim...
157 views 112 votes 15 years 9 months ago  IMC 2009»
Triangle inequality violations (TIVs) are important for latency sensitive distributed applications. On one hand, they can expose opportunities to improve network routing by findi...
149 views 122 votes 15 years 4 months ago  DEBS 2008»
We propose a sensornet programming model based on declarative spatio-temporal constraints on events only, not sensors. Where previous approaches conflate events and sensors becaus...