— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Abstract. To process aggregation queries issued through different sensors as access points in sensor networks, existing algorithms handle queries independently and perform in-netw...
Ken C. K. Lee, Wang-Chien Lee, Baihua Zheng, Julia...
This paper addresses a problem in supply chain management that how scarce resources can be efficiently allocated among competing interests. We present a formal model of allocation...
Peer-to-Peer (P2P) computing has become a popular application model because of its easy resource sharing pattern and powerful query search scheme. However, decentralized P2P archi...
Jinsong Han, Yunhao Liu, Li Xiao, Renyi Xiao, Lion...
In this work we study energy efficient routing strategies for wireless ad-hoc networks. In this kind of networks, energy is a scarce resource and its conservation and efficient us...
Panagiotis C. Kokkinos, Christos A. Papageorgiou, ...