Sciweavers

5815 search results - page 1003 / 1163
» Self-monitoring for sensor networks
Sort
View
ADHOCNOW
2007
Springer
15 years 7 months ago
Information Brokerage Via Location-Free Double Rulings
The in-network aggregation and processing of information is what sets a sensor network apart from a pure data acquisition device. One way to model the exchange of information betwe...
Stefan Funke, Imran Rauf
ICNP
2006
IEEE
15 years 7 months ago
Key Grids: A Protocol Family for Assigning Symmetric Keys
We describe a family of ÐÓ Ò protocols for assigning symmetric keys to Ò processes in a network so that each process can use its assigned keys to communicate securely with eve...
Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gou...
MOBISYS
2008
ACM
16 years 24 days ago
Micro-Blog: sharing and querying content through mobile phones and social participation
Recent years have witnessed the impacts of distributed content sharing (Wikipedia, Blogger), social networks (Facebook, MySpace), sensor networks, and pervasive computing. We beli...
Al Schmidt, Jack Li, Landon P. Cox, Romit Roy Chou...
INFOCOM
2005
IEEE
15 years 6 months ago
Gossip algorithms: design, analysis and applications
Abstract— Motivated by applications to sensor, peer-topeer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and...
Stephen P. Boyd, Arpita Ghosh, Balaji Prabhakar, D...
OPODIS
2004
15 years 2 months ago
Self-optimizing DHTs Using Request Profiling
S (in alphabetic order by speaker surname) Speaker: Uri Abraham (Ben-Gurion University) Title: Self-Stabilizing TimeStamps : Speaker: Anish Arora (Ohio State) Title: Self-Stabilizi...
Alina Bejan, Sukumar Ghosh
« Prev « First page 1003 / 1163 Last » Next »