Sciweavers

720 search results - page 29 / 144
» Monitoring Churn in Wireless Networks
Sort
View
TON
2012
11 years 10 months ago
A Game-Theoretic Approach to Anonymous Networking
—Anonymous wireless networking is studied when an adversary monitors the transmission timing of an unknown subset of the network nodes. For a desired quality of service (QoS), as...
Parvathinathan Venkitasubramaniam, Lang Tong
WIOPT
2006
IEEE
14 years 1 months ago
Scheduling sensor activity for point information coverage in wireless sensor networks
Abstract— An important application of wireless sensor networks is to perform the monitoring missions, for example, to monitor some targets of interests at all times. Sensors are ...
Bang Wang, Kee Chaing Chua, Vikram Srinivasan, Wei...
SENSYS
2009
ACM
14 years 2 months ago
Wildlife and environmental monitoring using RFID and WSN technology
bstract: Wildlife and Environmental Monitoring using RFID and WSN Technology Vladimir Dyo1, Stephen A. Ellwood2, David W. Macdonald2, Andrew Markham3 Cecilia Mascolo4, Bence P´asz...
Vladimir Dyo, Stephen A. Ellwood, David W. Macdona...
SIGMOD
2006
ACM
170views Database» more  SIGMOD 2006»
14 years 7 months ago
Energy-efficient monitoring of extreme values in sensor networks
Monitoring extreme values (MAX or MIN) is a fundamental problem in wireless sensor networks (and in general, complex dynamic systems). This problem presents very different algorit...
Adam Silberstein, Jun Yang 0001, Kamesh Munagala
USS
2008
13 years 10 months ago
Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice
We reverse engineer copyright enforcement in the popular BitTorrent file sharing network and find that a common approach for identifying infringing users is not conclusive. We desc...
Michael Piatek, Tadayoshi Kohno, Arvind Krishnamur...