Sciweavers

330 search results - page 32 / 66
» Controlling data disclosure in computational PIR protocols
Sort
View
DSN
2007
IEEE
14 years 3 months ago
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks
Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms that can be incorporated with ...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
CLOUD
2010
ACM
14 years 1 months ago
G-Store: a scalable data store for transactional multi key access in the cloud
Cloud computing has emerged as a preferred platform for deploying scalable web-applications. With the growing scale of these applications and the data associated with them, scalab...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
PEWASUN
2006
ACM
14 years 2 months ago
End-to-end performance characteristics in energy-aware wireless sensor networks
In this paper, we study end-to-end performance characteristics of S-MAC, an energy-aware medium access control (MAC) protocol for wireless sensor networks (WSN). WSNs are composed...
Feng Chen, Falko Dressler, Armin Heindl
ICDM2
2004
Springer
196views Data Mining» more  ICDM2 2004»
14 years 2 months ago
An Early Warning System for Vehicle Related Quality Data
Vehicle production audit tests, warranty claims and car control unit data are stored in a central data warehouse for data mining analysis. Neural network based part failure rate es...
Matthias Grabert, Markus Prechtel, Tomas Hrycej, W...
DCOSS
2006
Springer
14 years 14 days ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li