Sciweavers

2610 search results - page 505 / 522
» Computational Probabilistic Non-interference
Sort
View
MOBICOM
2009
ACM
14 years 3 months ago
Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links
Intended for network-wide dissemination of commands, configurations and code binaries, flooding has been investigated extensively in wireless networks. However, little work has ...
Shuo Guo, Yu Gu, Bo Jiang, Tian He
SIGIR
2009
ACM
14 years 3 months ago
Learning to recommend with social trust ensemble
As an indispensable technique in the field of Information Filtering, Recommender System has been well studied and developed both in academia and in industry recently. However, mo...
Hao Ma, Irwin King, Michael R. Lyu
GLOBECOM
2008
IEEE
14 years 3 months ago
Delay-Energy Tradeoffs in Wireless Ad-Hoc Networks with Partial Channel State Information
Given a wireless network where each link undergoes small-scale (Rayleigh) fading, we consider the problem of routing a message from a source node to a target node while minimizing...
Matthew Brand, Andreas F. Molisch
INFOCOM
2008
IEEE
14 years 3 months ago
Power-Adjusted Random Access to a Wireless Channel
—The operation of widely-deployed random access to wireless networks is based on limited information on the result of each access attempt. When making a random access attempt, us...
Young-June Choi, Kang G. Shin
ICNP
2007
IEEE
14 years 3 months ago
Routing amid Colluding Attackers
Abstract— We propose the first practical solution to the longstanding problem of secure wireless routing in the presence of colluding attackers. Our secure routing protocol, Spr...
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Kr...