Sciweavers

1498 search results - page 245 / 300
» Collection tree protocol
Sort
View
IJNSEC
2008
124views more  IJNSEC 2008»
13 years 9 months ago
Scalable Delay-constrained Multicast Group Key Management
In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications requi...
Said Gharout, Yacine Challal, Abdelmadjid Bouabdal...
CORR
2007
Springer
132views Education» more  CORR 2007»
13 years 9 months ago
On Compact Routing for the Internet
The Internet’s routing system is facing stresses due to its poor fundamental scaling properties. Compact routing is a research field that studies fundamental limits of routing ...
Dmitri V. Krioukov, Kimberly C. Claffy, Kevin R. F...
ASE
2002
160views more  ASE 2002»
13 years 8 months ago
Proving Invariants of I/O Automata with TAME
This paper describes a specialized interface to PVS called TAME (Timed Automata Modeling Environment) which provides automated support for proving properties of I/O automata. A maj...
Myla Archer, Constance L. Heitmeyer, Elvinia Ricco...
OSDI
2006
ACM
14 years 9 months ago
Fidelity and Yield in a Volcano Monitoring Sensor Network
We present a science-centric evaluation of a 19-day sensor network deployment at Reventador, an active volcano in Ecuador. Each of the 16 sensors continuously sampled seismic and ...
Geoffrey Werner-Allen, Konrad Lorincz, Jeff Johnso...
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
14 years 9 months ago
Secure outsourced aggregation via one-way chains
We consider the Outsourced Aggregation model, where sensing services outsource their sensor data collection and aggregation tasks to third-party service providers called aggregato...
Suman Nath, Haifeng Yu, Haowen Chan