Sciweavers

1551 search results - page 156 / 156
» Privacy-Preserving Network Aggregation
Sort
View
109 views 123 votes 15 years 8 months ago  ICNP 2003»
This paper targets the problem of optimal resource allocation in overlay multicast, which poses both theoretical and practical challenges. Theoretically, resource allocation among...
180 views 231 votes 16 years 4 months ago  ICDE 2005»
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
172 views 125 votes 16 years 2 months ago  MOBISYS 2007»
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
273 views 127 votes 15 years 9 months ago  ANSS 2008»
It is common for simulation and analytical studies to model Internet traffic as an aggregation of mostly persistent TCP flows. In practice, however, flows follow a heavytailed ...
192 views 156 votes 15 years 9 months ago  VTC 2007»
Opportunistic user access scheduling enhances the capacity of wireless networks by exploiting the multi user diversity. When frame aggregation is used, opportunistic schemes are no...
94 views 105 votes 15 years 9 months ago  ICPPW 2006»
With the rapid emergence of peer-to-peer applications, more and more applications will generate many-to-one rather than one-to-one traffic flows. While a number of previous works ...
129 views 130 votes 15 years 8 months ago  VLDB 2005»
Emerging large-scale monitoring applications require continuous tracking of complex dataanalysis queries over collections of physicallydistributed streams. Effective solutions hav...
114 views 108 votes 15 years 8 months ago  ATAL 2003»
We previously developed a social mechanism for distributed reputation management, in which an agent combines testimonies from several witnesses to determine its ratings of another...
187 views 117 votes 13 years 5 months ago  INFOCOM 2012»
—With the advent of the new IEEE 802.11p DSRC/WAVE radios, Vehicle-to-Vehicle (V2V) communications is poised for a dramatic leap. A canonical application for these future vehicul...
212 views 112 votes 15 years 3 months ago  MOBICOM 2010»
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...