Sciweavers

828 search results - page 120 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
138
Voted
PERCOM
2005
ACM
16 years 2 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
156
Voted
HPDC
2007
IEEE
15 years 9 months ago
A fast topology inference: a building block for network-aware parallel processing
Adapting to the network is the key to achieving high performance for communication-intensive applications, including scientific computing, data intensive computing, and multicast...
Tatsuya Shirai, Hideo Saito, Kenjiro Taura
182
Voted
TCSV
2008
298views more  TCSV 2008»
15 years 2 months ago
TrustStream: A Secure and Scalable Architecture for Large-Scale Internet Media Streaming
Abstract--To effectively address the explosive growth of multimedia applications over the Internet, a large-scale media streaming system has to fully take into account the issues o...
Hao Yin, Chuang Lin, Qian Zhang, Zhijia Chen, Dape...
111
Voted
VTC
2007
IEEE
15 years 9 months ago
Spatial Outage Probability Formula for CDMA Networks
— In this paper, we propose a new framework for the study of cellular networks called the fluid model and we derive from this model analytical formulas for interference, outage ...
Jean Marc Kelif, Marceau Coupechoux, Philippe Godl...
120
Voted
SUTC
2010
IEEE
15 years 6 months ago
ASample: Adaptive Spatial Sampling in Wireless Sensor Networks
Abstract—A prominent application of Wireless Sensor Networks is the monitoring of physical phenomena. The value of the monitored attributes naturally depends on the accuracy of t...
Piotr Szczytowski, Abdelmajid Khelil, Neeraj Suri