Sciweavers

646 search results - page 79 / 130
» A Non-beaconing ZigBee Network Implementation and Performanc...
Sort
View
NSDI
2010
13 years 9 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
IAJIT
2008
105views more  IAJIT 2008»
13 years 7 months ago
Developing Approaches of Supply Chain Management Systems of Enterprises in Pakistan
: This paper identifies the problems of pakistani enterprises concerning supply chain networks and orders solutions to improving its overall performance and competitiveness. Seldom...
Danish Irfan, Xiaofei Xu, Deng Sheng Chun
IPSN
2007
Springer
14 years 1 months ago
Robust message-passing for statistical inference in sensor networks
Large-scale sensor network applications require in-network processing and data fusion to compute statistically relevant summaries of the sensed measurements. This paper studies di...
Jeremy Schiff, Dominic Antonelli, Alexandros G. Di...
INFOCOM
2005
IEEE
14 years 1 months ago
Joint optimal scheduling and routing for maximum network throughput
— In this paper we consider packet networks loaded by admissible traffic patterns, i.e. by traffic patterns that, if optimally routed, do not overload network resources. In the...
Emilio Leonardi, Marco Mellia, Marco Ajmone Marsan...
JCS
2006
116views more  JCS 2006»
13 years 7 months ago
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Our protocol exploits the property of ad hoc networks that each membe...
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jaj...