Sciweavers

40 search results - page 4 / 8
» Large-Scale Network Simulation: How Big
Sort
View
P2P
2008
IEEE
14 years 2 months ago
Peer-to-Peer Secure Multi-party Numerical Computation
We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collabo...
Danny Bickson, Danny Dolev, Genia Bezman, Benny Pi...
LCN
2007
IEEE
14 years 1 months ago
Cluster-based Forwarding in Delay Tolerant Public Transport Networks
— Packet forwarding in Public Transport Networks is particularly challenging due to the high mobility, rapidly changing topology and intermittent connectivity observed in these n...
Shabbir Ahmed, Salil S. Kanhere
CCS
2009
ACM
14 years 2 months ago
On cellular botnets: measuring the impact of malicious devices on a cellular network core
The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable but largely insecure mobile devices threatens cellular networks. In this paper,...
Patrick Traynor, Michael Lin, Machigar Ongtang, Vi...
TMC
2010
136views more  TMC 2010»
13 years 6 months ago
Relay Node Deployment Strategies in Heterogeneous Wireless Sensor Networks
– While a lot of existing research attempts to extend the lifetime of a wireless sensor network (WSN) by designing energy efficient networking protocols, the impact of random dev...
Kenan Xu, Hossam S. Hassanein, Glen Takahara, Quan...
CCGRID
2004
IEEE
13 years 11 months ago
Remote partial file access using compact pattern descriptions
We present a method for the efficient access to parts of remote files. The efficiency is achieved by using a file format independent compact pattern description, that allows to re...
Thorsten Schütt, André Merzky, Andrei ...