Sciweavers

3218 search results - page 515 / 644
» Timed Extensions for SDL
Sort
View
143
Voted
TMC
2010
134views more  TMC 2010»
15 years 3 months ago
Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks
—Wireless mesh networks are a promising area for the deployment of new wireless communication and networking technologies. In this paper, we address the problem of enabling effec...
Claudia Canali, Maria Elena Renda, Paolo Santi, Si...
TMC
2010
138views more  TMC 2010»
15 years 3 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
TPDS
2010
89views more  TPDS 2010»
15 years 3 months ago
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sensor Networks
—Various sensor types, e.g., temperature, humidity, and acoustic, sense physical phenomena in different ways, and thus, are expected to have different sensing models. Even for th...
Mohamed Hefeeda, Hossein Ahmadi
TPDS
2010
142views more  TPDS 2010»
15 years 3 months ago
Toward Optimal Network Fault Correction in Externally Managed Overlay Networks
—We consider an end-to-end approach of inferring probabilistic data-forwarding failures in an externally managed overlay network, where overlay nodes are independently operated b...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein
VLDB
2010
ACM
190views Database» more  VLDB 2010»
15 years 3 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias