Sciweavers

1807 search results - page 220 / 362
» Resilient Overlay Networks
Sort
View
TON
2008
108views more  TON 2008»
15 years 4 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
157
Voted
TMC
2008
109views more  TMC 2008»
15 years 4 months ago
SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks
Key predistribution has been claimed to be the only viable approach for establishing shared keys between neighboring sensors after deployment for a typical sensor network. However,...
Fang Liu, Xiuzhen Cheng, Liran Ma, Kai Xing
TMC
2012
13 years 7 months ago
Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
—This article1 presents the design of a networked system for joint compression, rate control and error correction of video over resource-constrained embedded devices based on the...
Scott Pudlewski, Arvind Prasanna, Tommaso Melodia
166
Voted
CCGRID
2003
IEEE
15 years 10 months ago
DKS (N, k, f): A Family of Low Communication, Scalable and Fault-Tolerant Infrastructures for P2P Applications
In this paper, we present DKS(N, k, f), a family of infrastructures for building Peer-To-Peer applications. Each instance of DKS(N, k, f) is a fully decentralized overlay network ...
Luc Onana Alima, Sameh El-Ansary, Per Brand, Seif ...
SIGMETRICS
2003
ACM
119views Hardware» more  SIGMETRICS 2003»
15 years 10 months ago
Incrementally improving lookup latency in distributed hash table systems
Distributed hash table (DHT) systems are an important class of peer-to-peer routing infrastructures. They enable scalable wide-area storage and retrieval of information, and will ...
Hui Zhang 0002, Ashish Goel, Ramesh Govindan