Sciweavers

1551 search results - page 32 / 156
» Privacy-Preserving Network Aggregation
Sort
View
186 views 160 votes 15 years 4 months ago  ADHOCNOW 2008»
This paper presents a novel method for optimizing sliding window based continuous queries. We deal with two categories of aggregation operations: stepwise aggregation (e.g. COUNT) ...
129 views 105 votes 15 years 9 months ago  ISCC 2009»
A problem in large and dynamic networks consists in making available at each node global information about the state of the network. Gossip-based aggregation schemes are a simple ...
107 views 109 votes 15 years 3 months ago  IPL 2007»
Dynamic networks are characterized by transit times on edges. Dynamic flow problems consider transshipment problems in dynamic networks. We introduce a new version of dynamic fl...
187 views 124 votes 16 years 3 months ago  EDBT 2004»
Earlier work has demonstrated the effectiveness of in-network data aggregation in order to minimize the amount of messages exchanged during continuous queries in large sensor netwo...
177 views 136 votes 15 years 29 days ago  WD 2010»
Gossip-based epidemic protocols are used to aggregate data in distributed systems. This fault-tolerant approach does neither require maintenance of any global network state nor kno...
143 views 163 votes 15 years 28 days ago  ALGOSENSORS 2009»
Abstract. We describe a novel approach for constructing a single spanning tree for data aggregation towards a sink node. The tree is universal in the sense that it is static and in...
164 views 150 votes 15 years 8 months ago  AICCSA 2005»
Recent years have witnessed a growing interest in the application of wireless sensor networks in unattended environments. Nodes in such applications are equipped with limited ener...
142 views 107 votes 15 years 4 months ago  ADHOCNOW 2010»
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
166 views 115 votes 15 years 10 months ago  ICDS 2009»
—In a wireless sensor network application for tracking multiple mobile targets, large amounts of sensing data can be generated by a number of sensors. These data must be controll...
177 views 139 votes 15 years 29 days ago  SECON 2010»
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...