Sciweavers

1551 search results - page 70 / 156
» Privacy-Preserving Network Aggregation
Sort
View
96 views 125 votes 15 years 9 months ago  SECON 2007»
Abstract— Most existing work in aggregation and querying for sensor network data has focused on the use of standard statistical operations (average, median, etc) to reduce the qu...
88 views 117 votes 15 years 4 months ago  NETWORKING 2000»
Abstract. We examine the fair allocation of capacity to a large population of best-effort connections in a typical multiple access communication system supporting some bandwidth on...
146 views 157 votes 15 years 21 days ago  DMTCS 2010»
This paper studies the fundamental trade-off between communication cost and delay cost arising in various contexts such as control message aggregation or organization theory. An o...
94 views 104 votes 15 years 4 months ago  AIMS 2010»
Distributed aggregation algorithms are important in many present and future computing applications. However, after a decade of research, there are still numerous open questions reg...
166 views 111 votes 15 years 5 months ago  JCDL 2010»
Attending a complex scheduled social event, such as a multi-day music festival, requires a significant amount of planning before and during its progression. Advancements in mobile...
125 views 123 votes 15 years 4 months ago  AAAI 2006»
This paper considers a distributed system of software agents who cooperate in helping their users to find services, provided by different agents. The agents need to ensure that th...
164 views 162 votes 14 years 10 months ago  TPDS 2010»
The basic operation in such a network is the systematic gathering (with or without in-network aggregation) and transmitting of sensed data to a base station for further processing....
127 views 153 votes 15 years 3 months ago  CN 2008»
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
105 views 127 votes 15 years 4 months ago  MMNS 2007»
In this paper, we show the feasibility of real-time flow monitoring with controllable accuracy in today’s IP networks. Our approach is based on Netflow and A-GAP. A-GAP is a prot...
255 views 126 votes 15 years 3 months ago  MOBICOM 2010»
Aggregating multiple 802.11 Access Point (AP) backhauls using a single-radio WLAN card has been considered as a way of bypassing the backhaul capacity limit. However, current AP a...