Sciweavers

1716 search results - page 228 / 344
» Approximation Algorithms for Data Broadcast in Wireless Netw...
Sort
View
TMC
2008
120views more  TMC 2008»
13 years 9 months ago
Mitigating Performance Degradation in Congested Sensor Networks
Data generated in wireless sensor networks may not all be alike: some data may be more important than others and hence may have different delivery requirements. In this paper, we a...
Raju Kumar, Riccardo Crepaldi, Hosam Rowaihy, Albe...
DAC
2003
ACM
14 years 10 months ago
A low-energy chip-set for wireless intercom
A low power wireless intercom system is designed and implemented. Two fully-operational ASICs, integrating custom and commercial IP, implement the entire digital portion of the pr...
M. Josie Ammer, Michael Sheets, Tufan C. Karalar, ...
ICDE
2005
IEEE
108views Database» more  ICDE 2005»
14 years 10 months ago
Range Efficient Computation of F0 over Massive Data Streams
Efficient one-pass computation of F0, the number of distinct elements in a data stream, is a fundamental problem arising in various contexts in databases and networking. We consid...
Pavan Aduri, Srikanta Tirthapura
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
14 years 6 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
ICDCSW
2003
IEEE
14 years 2 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako