Sciweavers

5114 search results - page 112 / 1023
» Complex networks
Sort
View
EUROCRYPT
2007
Springer
14 years 1 months ago
Round-Efficient Secure Computation in Point-to-Point Networks
Essentially all work studying the round complexity of secure computation assumes broadcast as an atomic primitive. Protocols constructed under this assumption tend to have very poo...
Jonathan Katz, Chiu-Yuen Koo
CONEXT
2009
ACM
13 years 10 months ago
Macroscope: end-point approach to networked application dependency discovery
Enterprise and data center networks consist of a large number of complex networked applications and services that depend upon each other. For this reason, they are difficult to ma...
Lucian Popa 0002, Byung-Gon Chun, Ion Stoica, Jaid...
ICDCS
2007
IEEE
14 years 3 months ago
Non-Threshold based Event Detection for 3D Environment Monitoring in Sensor Networks
Event detection is a crucial task for wireless sensor network applications, especially environment monitoring. Existing approaches for event detection are mainly based on some pre...
Mo Li, Yunhao Liu, Lei Chen 0002
TKDE
2008
137views more  TKDE 2008»
13 years 9 months ago
Nonthreshold-Based Event Detection for 3D Environment Monitoring in Sensor Networks
Event detection is a crucial task for wireless sensor network applications, especially environment monitoring. Existing approaches for event detection are mainly based on some pred...
Mo Li, Yunhao Liu, Lei Chen 0002
CN
2002
98views more  CN 2002»
13 years 9 months ago
New models and algorithms for programmable networks
In todays IP networks most of the network control and management tasks are performed at the end points. As a result, many important network functions cannot be optimized due to la...
Danny Raz, Yuval Shavitt