Sciweavers

236 search results - page 29 / 48
» Increasing the determinism of network emulation to evaluate ...
Sort
View
MOBIHOC
2009
ACM
14 years 9 months ago
Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods
Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grai...
Dezun Dong, Yunhao Liu, Xiangke Liao
MOBIQUITOUS
2007
IEEE
14 years 2 months ago
Anonymous Data Collection in Sensor Networks
—Sensor networks involving human participants will require privacy protection before wide deployment is feasible. This paper proposes and evaluates a set of protocols that enable...
James Horey, Michael M. Groat, Stephanie Forrest, ...
CONEXT
2009
ACM
13 years 9 months ago
Scaling all-pairs overlay routing
This paper presents and experimentally evaluates a new algorithm for efficient one-hop link-state routing in full-mesh networks. Prior techniques for this setting scale poorly, as...
David Sontag, Yang Zhang, Amar Phanishayee, David ...
VTC
2007
IEEE
100views Communications» more  VTC 2007»
14 years 2 months ago
Data-Centric Routing in Sensor Networks: Single-hop Broadcast or Multi-hop Unicast?
— Data dissemination strategies and communication protocols that minimize the use of energy can significantly prolong the lifetime of a sensor network. Data-centric disseminatio...
Xuan Zhong, R. Khosla, Gunjan Khanna, Saurabh Bagc...
ICISC
2008
103views Cryptology» more  ICISC 2008»
13 years 10 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003