Sciweavers

448 search results - page 35 / 90
» Implementation and Performance Evaluation of the re-ECN Prot...
Sort
View
ADHOC
2008
135views more  ADHOC 2008»
13 years 7 months ago
Rapid design and evaluation framework for wireless sensor networks
The diversity of applications and typically scarce node resources set very tight constraints to Wireless Sensor Networks (WSN). It is not possible to fulfill all requirements with...
Mauri Kuorilehto, Marko Hännikäinen, Tim...
FC
2009
Springer
67views Cryptology» more  FC 2009»
13 years 11 months ago
Privacy-Preserving Classifier Learning
We present an efficient protocol for the privacy-preserving, distributed learning of decision-tree classifiers. Our protocol allows a user to construct a classifier on a database h...
Justin Brickell, Vitaly Shmatikov
SECON
2008
IEEE
14 years 2 months ago
Immunity-Based Epidemic Routing in Intermittent Networks
– In this research, we propose to modify and extend epidemic routing used in intermittent networks. In particular, we propose to include immunity-based information disseminated i...
Padma Mundur, Matthew Seligman, Jin Na Lee
MUM
2006
ACM
181views Multimedia» more  MUM 2006»
14 years 1 months ago
Cross-layer design for providing service oriented architecture in a mobile Ad Hoc network
This paper presents a novel cross-layer design for providing service oriented architecture (SOA) in a mobile ad hoc network (MANET). In the design SOA service discovery is integra...
Tommi Halonen, Timo Ojala
EDOC
2000
IEEE
14 years 2 days ago
Wireless Java RMI
Due to its high protocol overhead, both in data traffic and in round-trips, Java RMI is poorly suited for communication over slow wireless links. However, its performance can be ...
Stefano Campadello, Oskari Koskimies, Kimmo E. E. ...