Sciweavers

92 search results - page 15 / 19
» Minimizing Expected Attacking Cost in Networks
Sort
View
SIGMOD
2006
ACM
126views Database» more  SIGMOD 2006»
14 years 8 months ago
Constraint chaining: on energy-efficient continuous monitoring in sensor networks
Wireless sensor networks have created new opportunities for data collection in a variety of scenarios, such as environmental and industrial, where we expect data to be temporally ...
Adam Silberstein, Jun Yang 0001, Rebecca Braynard
DMSN
2007
ACM
13 years 11 months ago
Similarity-aware query allocation in sensor networks with multiple base stations
In this paper, we consider a large scale sensor network comprising multiple, say K, base stations and a large number of wireless sensors. Such an infrastructure is expected to be ...
Shili Xiang, Hock-Beng Lim, Kian-Lee Tan, Yongluan...
JSAC
2007
177views more  JSAC 2007»
13 years 7 months ago
Achieving Shared Protection for Dynamic Multicast Sessions in Survivable Mesh WDM Networks
— The advances in wavelength-division multiplexing (WDM) technology are expected to facilitate bandwidth-intensive multicast applications. A single fiber failure in such a netwo...
Hongbin Luo, Lemin Li, Hongfang Yu, Sheng Wang
INFOCOM
1997
IEEE
14 years 2 days ago
VBR over VBR: The Homogeneous, Loss-Free Case
We consider the multiplexing of several variable bit rate (VBR) connections over one variable bit rate connection where the multiplexing uses a multiplexing bu er of size B. The V...
Silvia Giordano, Jean-Yves Le Boudec, Philippe Oec...
COCOON
2005
Springer
14 years 1 months ago
Server Allocation Algorithms for Tiered Systems
Many web-based systems have a tiered application architecture, in which a request needs to transverse all the tiers before finishing its processing. One of the most important QoS...
Kamalika Chaudhuri, Anshul Kothari, Rudi Pendaving...