Sciweavers

1498 search results - page 231 / 300
» Collection tree protocol
Sort
View
EWSN
2008
Springer
14 years 8 months ago
Lifetime Maximization in Wireless Sensor Networks by Distributed Binary Search
We consider the problem of determining the transmission power assignment that maximizes the lifetime of a data-gathering wireless sensor network with stationary nodes and static tr...
André Schumacher, Harri Haanpää, ...
INFOCOM
2009
IEEE
14 years 3 months ago
Towards Economically Viable Infrastructure-Based Overlay Multicast Networks
—Internet-scale dissemination of streaming contents (e.g., live sports games) can be achieved by infrastructure-based overlay multicast networks, where multicast service provider...
Varun Khare, Bo Zhang
FC
2009
Springer
118views Cryptology» more  FC 2009»
14 years 3 months ago
Cryptographic Combinatorial Clock-Proxy Auctions
We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trust...
David C. Parkes, Michael O. Rabin, Christopher Tho...
FOCS
2008
IEEE
14 years 3 months ago
Lower Bounds for Noisy Wireless Networks using Sampling Algorithms
We show a tight lower bound of Ω(N log log N) on the number of transmissions required to compute several functions (including the parity function and the majority function) in a...
Chinmoy Dutta, Jaikumar Radhakrishnan
WCNC
2008
IEEE
14 years 3 months ago
A Low Latency Scheme for Bulk RFID Tag Reading
—Passive RFID tags transmit their ID information to a tag reader upon energization by the reader. These transmitted signals, or IDs, may collide if multiple tags transmit their I...
Erik F. Golen, Nirmala Shenoy, Xiaojun Cao