Sciweavers

448 search results - page 50 / 90
» k-anonymous message transmission
Sort
View
ICDE
2005
IEEE
115views Database» more  ICDE 2005»
15 years 11 months ago
Snapshot Queries: Towards Data-Centric Sensor Networks
In this paper we introduce the idea of snapshot queries for energy efficient data acquisition in sensor networks. Network nodes generate models of their surrounding environment th...
Yannis Kotidis
ARTCOM
2009
IEEE
15 years 4 months ago
Sender-Side Public Key Deniable Encryption Scheme
— Consider a situation in which the transmission of encrypted message is intercepted by an adversary who can later ask the sender to reveal the random choices (and also the secre...
Jaydeep Howlader, Saikat Basu
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 4 months ago
Dynamic Coexistence of Frequency Hopping Networks Using Parallel and Gaussian Allocations
Abstract—This paper studies the coexistence of several independent and dynamic wireless networks using the frequency hopping technique in the unlicensed radio band. We propose a ...
Mohammad Masud Hasan, Ravi Prakash, Jason P. Jue
ADHOCNOW
2009
Springer
15 years 4 months ago
Minimum Delay Data Gathering in Radio Networks
The aim of this paper is to design efficient gathering algorithms (data collection) in a Base Station of a wireless multi hop grid network when interferences constraints are presen...
Jean-Claude Bermond, Nicolas Nisse, Patricio Reyes...
CISS
2008
IEEE
15 years 4 months ago
Optimizing redundancy using MDS codes and dynamic symbol allocation in mobile ad hoc networks
—We consider the design of a network in which packet transmissions between two nodes are to be guaranteed a certain probability of success. There are N independent paths between ...
Anna Kacewicz, Stephen B. Wicker