Sciweavers

1263 search results - page 226 / 253
» Joint Optimization of Wireless Communication and Networked C...
Sort
View
CCS
2006
ACM
13 years 11 months ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
ICDCN
2009
Springer
14 years 2 months ago
Flooding-Assisted Threshold Assignment for Aggregate Monitoring in Sensor Networks
The research community has witnessed a large interest in monitoring large scale distributed systems. In these applications typically we wish to monitor a global system condition wh...
Ali Abbasi, Ahmad Khonsari, Mohammad Sadegh Talebi
JSAC
2007
101views more  JSAC 2007»
13 years 7 months ago
CoopMAC: A Cooperative MAC for Wireless LANs
— Due to the broadcast nature of wireless signals, a wireless transmission intended for a particular destination station can be overheard by other neighboring stations. A focus o...
Pei Liu, Zhifeng Tao, Sathya Narayanan, Thanasis K...
INFOCOM
2012
IEEE
11 years 10 months ago
Towards energy-fairness in asynchronous duty-cycling sensor networks
Abstract—In this paper, we investigate the problem of controlling node sleep intervals so as to achieve the min-max energy fairness in asynchronous duty-cycling sensor networks. ...
Zhenjiang Li, Mo Li, Yunhao Liu
GLOBECOM
2008
IEEE
14 years 2 months ago
Pricing of Differentiated-QoS Services WiMAX Networks
Abstract—WiMAX/IEEE 802.16 system is a very open Broadband Wireless Access (BWA) technology with different possible services. Pricing of WiMAX is an important topic with differen...
Aymen Belghith, Loutfi Nuaymi, Patrick Maill&eacut...