Sciweavers

4911 search results - page 664 / 983
» Tree dependence analysis
Sort
View
VTC
2010
IEEE
107views Communications» more  VTC 2010»
15 years 2 months ago
Contention-Based Neighborhood Estimation
—This paper proposes a probabilistic technique that enables a node to estimate the number of its neighbors that fulfill certain criteria. The technique does not require any a pr...
Helmut Adam, Evsen Yanmaz, Wilfried Elmenreich, Ch...
WDAG
2010
Springer
158views Algorithms» more  WDAG 2010»
15 years 2 months ago
Distributed Contention Resolution in Wireless Networks
We present and analyze simple distributed contention resolution protocols for wireless networks. In our setting, one is given n pairs of senders and receivers located in a metric ...
Thomas Kesselheim, Berthold Vöcking
DIMVA
2010
15 years 2 months ago
KIDS - Keyed Intrusion Detection System
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to m...
Sasa Mrdovic, Branislava Drazenovic
ICRA
2010
IEEE
158views Robotics» more  ICRA 2010»
15 years 2 months ago
Towards optimally efficient field estimation with threshold-based pruning in real robotic sensor networks
Abstract-- The efficiency of distributed sensor networks depends on an optimal trade-off between the usage of resources and data quality. The work in this paper addresses the probl...
Amanda Prorok, Christopher M. Cianci, Alcherio Mar...
137
Voted
PODC
2010
ACM
15 years 1 months ago
Brief announcement: distributed contention resolution in wireless networks
We present and analyze simple distributed contention resolution protocols for wireless networks. In our setting, one is given n pairs of senders and receivers located in a metric ...
Thomas Kesselheim, Berthold Vöcking