Sciweavers

46 search results - page 7 / 10
» iscc 2006
Sort
View
ISCC
2006
IEEE
15 years 6 months ago
Security for the Mythical Air-Dropped Sensor Network
The research area of very large scale wireless sensor networks made of low-cost sensors is gaining a lot of interest as witnessed by the large number of published papers. The secu...
Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andr...
ISCC
2006
IEEE
104views Communications» more  ISCC 2006»
15 years 6 months ago
Stable High-Capacity One-Hop Distributed Hash Tables
Most research on Distributed Hash Tables (DHTs) assumes ephemeral, lightly loaded deployments. Each node has a lifetime of a few hours and initiates a lookup once every few second...
John Risson, Aaron Harwood, Tim Moors
ISCC
2006
IEEE
118views Communications» more  ISCC 2006»
15 years 6 months ago
Performance of Paced and Non-Paced Transmission Control Algorithms in Small Buffered Networks
Famous rule-of-thumb states that a buffer sized at B = RTT × BW, where RTT is the average round trip time and BW is the bandwidth of output link is necessary in order to achieve ...
Onur Alparslan, Shin'ichi Arakawa, Masayuki Murata
ISCC
2006
IEEE
129views Communications» more  ISCC 2006»
15 years 6 months ago
A Semantic Overlay Network for P2P Schema-Based Data Integration
Abstract— Today data sources are pervasive and their number is growing tremendously. Current tools are not prepared to exploit this unprecedented amount of information and to cop...
Carmela Comito, Simon Patarin, Domenico Talia
ISCC
2006
IEEE
15 years 6 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...