Sciweavers

1498 search results - page 15 / 300
» Collection tree protocol
Sort
View
RFIDSEC
2010
13 years 4 months ago
EC-RAC: Enriching a Capacious RFID Attack Collection
Abstract. We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a parti...
Ton van Deursen, Sasa Radomirovic
ICIP
2006
IEEE
14 years 4 months ago
Multiple Tree Video Multicast Over Wireless Ad Hoc Networks
—In this paper, we propose multiple tree construction schemes and routing protocols for video streaming over wireless ad hoc networks. The basic idea is to split the video into m...
Avideh Zakhor, Wei Wei
INFOCOM
1999
IEEE
14 years 2 months ago
A Reliable, Efficient Topology Broadcast Protocol for Dynamic Networks
We present, prove correctness for, and evaluate a protocol for the reliable broadcast of topology and link-state information in a multihop communication network with a dynamic topo...
Bhargav R. Bellur, Richard G. Ogier
ICDCS
1996
IEEE
14 years 2 months ago
Group Routing without Group Routing Tables
We present a group routing protocol for a network of processes. The task of the protocol is to route data messages to each member of a process group. To this end, a tree of proces...
Jorge Arturo Cobb, Mohamed G. Gouda
ICDM
2006
IEEE
169views Data Mining» more  ICDM 2006»
14 years 4 months ago
Privacy-Preserving Data Imputation
In this paper, we investigate privacy-preserving data imputation on distributed databases. We present a privacypreserving protocol for filling in missing values using a lazy deci...
Geetha Jagannathan, Rebecca N. Wright