Sciweavers

1551 search results - page 94 / 156
» Privacy-Preserving Network Aggregation
Sort
View
99 views 147 votes 15 years 4 months ago  CIIT 2004»
Despite numerous efforts, the problem of providing per-flow Quality of Service in a scalable manner still remains an active area of research. This paper introduces a scalable arch...
104 views 111 votes 15 years 10 months ago  GLOBECOM 2009»
— Network coding has recently received increasing attention to improve performance and increase capacity in both wired and wireless communication networks. In this paper, we focu...
131 views 147 votes 15 years 9 months ago  AINA 2007»
This paper focuses on sensor networks as shared environmental infrastructures, and presents an approach to enable a sensor network to self-partition itself, at pre-defined energy ...
93 views 128 votes 15 years 8 months ago  IMC 2004»
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
176 views 126 votes 15 years 1 months ago  INFOCOM 2010»
—Upon the occurrence of a phenomenon of interest in a wireless sensor network, multiple sensors may be activated, leading to data implosion and redundancy. Data aggregation and/o...
94 views 123 votes 15 years 9 months ago  AINA 2006»
In this paper we present Clustering Protocol (CP) for sensor networks. Clustering techniques are used by different protocols and applications to increase scalability and reduce de...
185 views 164 votes 15 years 9 months ago  INFOCOM 2008»
—In multi-rate wireless LANs, throughput-based fair bandwidth allocation can lead to drastically reduced aggregate throughput. To balance aggregate throughput while serving users...
113 views 130 votes 15 years 8 months ago  CCGRID 2003»
— Grid computing requires network services beyond what is currently provided by the Best-Effort Internet. Among the different approaches towards network Quality of Service, aggre...
133 views 135 votes 15 years 7 months ago  ICDCS 2000»
Several studies in network traffic characterization have concluded that network traffic is self-similar and therefore not readily amenable to statistical multiplexing in a distr...
199 views 235 votes 16 years 4 months ago  GIS 2008»
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...