Sciweavers

2009 search results - page 193 / 402
» Towards Self-Configuring Networks
Sort
View
176
Voted
CONCUR
2010
Springer
15 years 5 months ago
Trust in Anonymity Networks
Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusi...
Vladimiro Sassone, Sardaouna Hamadou, Mu Yang
159
Voted
IJHPCN
2006
151views more  IJHPCN 2006»
15 years 5 months ago
Adaptive local searching and caching strategies for on-demand routing protocols in ad hoc networks
: On-demand routing protocols are widely used in mobile ad hoc networks due to their capability of adjusting to frequent network topology changes within acceptable routing overhead...
Zhao Cheng, Wendi B. Heinzelman
126
Voted
SIGMOBILE
2008
98views more  SIGMOBILE 2008»
15 years 5 months ago
TraNS: realistic joint traffic and network simulator for VANETs
Realistic simulation is a necessary tool for proper evaluation of newly developed protocols for Vehicular Ad Hoc Networks (VANETs). Several recent efforts focused on achieving thi...
Michal Piórkowski, Maxim Raya, A. Lezama Lu...
119
Voted
IJON
2007
99views more  IJON 2007»
15 years 4 months ago
Criticality of avalanche dynamics in adaptive recurrent networks
In many studies of self-organized criticality (SOC), branching processes were used to model the dynamics of the activity of the system during avalanches. This mathematical simpliï...
Anna Levina, Udo Ernst, J. Michael Herrmann
ICASSP
2009
IEEE
15 years 11 months ago
Energy-efficient graph-based wavelets for distributed coding in Wireless Sensor Networks
This work presents a class of unidirectional lifting-based wavelet transforms for an arbitrary communication graph in a wireless sensor network. These transforms are unidirectiona...
Godwin Shen, Sundeep Pattem, Antonio Ortega