Sciweavers

1551 search results - page 95 / 156
» Privacy-Preserving Network Aggregation
Sort
View
94 views 123 votes 15 years 9 months ago  AINA 2006»
In this paper we present Clustering Protocol (CP) for sensor networks. Clustering techniques are used by different protocols and applications to increase scalability and reduce de...
185 views 164 votes 15 years 9 months ago  INFOCOM 2008»
—In multi-rate wireless LANs, throughput-based fair bandwidth allocation can lead to drastically reduced aggregate throughput. To balance aggregate throughput while serving users...
113 views 130 votes 15 years 8 months ago  CCGRID 2003»
— Grid computing requires network services beyond what is currently provided by the Best-Effort Internet. Among the different approaches towards network Quality of Service, aggre...
133 views 135 votes 15 years 7 months ago  ICDCS 2000»
Several studies in network traffic characterization have concluded that network traffic is self-similar and therefore not readily amenable to statistical multiplexing in a distr...
199 views 235 votes 16 years 4 months ago  GIS 2008»
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...
213 views 171 votes 13 years 5 months ago  TMC 2012»
—A major benefit of employing network coding (NC) in cooperative communications (CC) is its ability to reduce time-slot overhead. Such approach is called network-coded CC (or NC...
304 views 148 votes 13 years 5 months ago  SDM 2012»
With the growth of the Internet and E-commerce, bipartite rating networks are ubiquitous. In such bipartite rating networks, there exist two types of entities: the users and the o...
100 views 122 votes 16 years 3 months ago  PERCOM 2004»
A framework for the dynamic aggregation of ubiquitous computers is presented. The framework aggregates applications from more than one mobile component that can migrate from compu...
129 views 137 votes 15 years 7 months ago  AINA 2006»
Ad hoc networks are dynamic networks formed "on the fly" by a set of nodes. Achieving secure routing in such networks is a big challenge. Asymmetric signature schemes pr...
100 views 116 votes 15 years 3 months ago  NN 2006»
In theories of cognition that view the mind as a system of interacting agents, there must be mechanisms for aggregate decision-making, such as voting. Here we show that certain vo...