Sciweavers

2500 search results - page 163 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
161
Voted
IWCMC
2010
ACM
15 years 3 months ago
Policy-driven workflows for mobile network management automation
Future wireless networks will experience a continuous growth regarding the number of network elements with increasingly complex interrelations between the configuration of multipl...
Raphael Romeikat, Bernhard Bauer, Tobias Bandh, Ge...
134
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
SMACK: a SMart ACKnowledgment scheme for broadcast messages in wireless networks
Network protocol designers, both at the physical and network level, have long considered interference and simultaneous transmission in wireless protocols as a problem to be avoide...
Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. ...
ACSAC
2009
IEEE
15 years 10 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
SASN
2006
ACM
15 years 9 months ago
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
This paper focuses on defending against compromised nodes’ dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networ...
Suk-Bok Lee, Yoon-Hwa Choi
122
Voted
SENSYS
2006
ACM
15 years 9 months ago
Supporting concurrent applications in wireless sensor networks
It is vital to support concurrent applications sharing a wireless sensor network in order to reduce the deployment and administrative costs, thus increasing the usability and efï¬...
Yang Yu, Loren J. Rittle, Vartika Bhandari, Jason ...