Sciweavers

118 search results - page 18 / 24
» Efficient Distributed Algorithm for RWA Using Path Protectio...
Sort
View
JSAC
2008
109views more  JSAC 2008»
13 years 6 months ago
Elastic service availability: utility framework and optimal provisioning
Service availability is one of the most closely scrutinized metrics in offering network services. It is important to cost-effectively provision a managed and differentiated networ...
Dahai Xu, Ying Li, Mung Chiang, A. Robert Calderba...
MOBIHOC
2008
ACM
14 years 7 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 7 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
WMASH
2003
ACM
14 years 24 days ago
An end-to-end multi-path smooth handoff scheme for stream media
In the near future, wide variety of wireless networks will be merged into the Internet and allow users to continue their application with higher degree of mobility. In such enviro...
Yi Pan, Meejeong Lee, Jaime Bae Kim, Tatsuya Suda
MOBIHOC
2001
ACM
14 years 7 months ago
Geometric spanner for routing in mobile networks
We propose a new routing graph, the Restricted Delaunay Graph (RDG), for ad hoc networks. Combined with a node clustering algorithm, RDG can be used as an underlying graph for geo...
Jie Gao, Leonidas J. Guibas, John Hershberger, Li ...