Sciweavers

1551 search results - page 155 / 156
» Privacy-Preserving Network Aggregation
Sort
View
209 views 156 votes 13 years 5 months ago  TON 2012»
Abstract—Wireless networks (including wireless mesh networks) provide opportunities for using multiple paths. Multihoming of hosts, possibly using different technologies and prov...
118 views 127 votes 15 years 6 months ago  DMSN 2007»
This paper assumes a set of n mobile sensors that move in the Euclidean plane as a swarm1 . Our objectives are to explore a given geographic region by detecting and aggregating sp...
216 views 132 votes 14 years 2 months ago  ICDCS 2011»
Abstract—Wireless Sensor Networks (WSNs) are increasingly available for mission-critical applications such as emergency management and health care. To meet the stringent requirem...
180 views 146 votes 15 years 2 months ago  CORR 2006»
The new social media sites--blogs, wikis, Flickr and Digg, among others--underscore the transformation of the Web to a participatory medium in which users are actively creating, e...
167 views 159 votes 15 years 23 days ago  VTC 2010»
Abstract--This paper analyzes the outage probability in cognitive radio networks, based on the Poisson point process model of node spatial distribution and the standard propagation...
109 views 123 votes 15 years 8 months ago  ICNP 2003»
This paper targets the problem of optimal resource allocation in overlay multicast, which poses both theoretical and practical challenges. Theoretically, resource allocation among...
180 views 232 votes 16 years 4 months ago  ICDE 2005»
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
172 views 125 votes 16 years 2 months ago  MOBISYS 2007»
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
273 views 127 votes 15 years 9 months ago  ANSS 2008»
It is common for simulation and analytical studies to model Internet traffic as an aggregation of mostly persistent TCP flows. In practice, however, flows follow a heavytailed ...
192 views 156 votes 15 years 9 months ago  VTC 2007»
Opportunistic user access scheduling enhances the capacity of wireless networks by exploiting the multi user diversity. When frame aggregation is used, opportunistic schemes are no...