Sciweavers

3678 search results - page 624 / 736
» On the Stable Paths Problem
Sort
View
113
Voted
ICDCS
2007
IEEE
15 years 10 months ago
Temporal Privacy in Wireless Sensor Networks
Although the content of sensor messages describing “events of interest” may be encrypted to provide confidentiality, the context surrounding these events may also be sensitiv...
Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong ...
135
Voted
ICPP
2007
IEEE
15 years 10 months ago
Architectural Challenges in Memory-Intensive, Real-Time Image Forming
The real-time image forming in future, high-end synthetic aperture radar systems is an example of an application that puts new demands on computer architectures. The initial quest...
Anders Ahlander, H. Hellsten, K. Lind, J. Lindgren...
147
Voted
ICPP
2007
IEEE
15 years 10 months ago
Towards Location-aware Topology in both Unstructured and Structured P2P Systems
A self-organizing peer-to-peer system is built upon an application level overlay, whose topology is independent of underlying physical network. A well-routed message path in such ...
Tongqing Qiu, Guihai Chen, Mao Ye, Edward Chan, Be...
138
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Bandwidth Balancing in Multi-Channel IEEE 802.16 Wireless Mesh Networks
Abstract— In wireless mesh networks, the end-to-end throughput of traffic flows depends on the path length, i.e. the higher the number of hops, the lower becomes the throughput...
Claudio Cicconetti, Ian F. Akyildiz, Luciano Lenzi...
114
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Combining Multihoming with Overlay Routing (or, How to Be a Better ISP without Owning a Network)
— Multihoming and overlay routing are used, mostly separately, to bypass Internet outages, congested links and long routes. In this paper, we examine a scenario in which multihom...
Yong Zhu, Constantinos Dovrolis, Mostafa H. Ammar