Sciweavers

529 search results - page 42 / 106
» Online Network Design with Outliers
Sort
View
ICDCS
2010
IEEE
14 years 2 months ago
Quantifying and Querying Network Reachability
—Quantifying and querying network reachability is important for security monitoring and auditing as well as many aspects of network management such as troubleshooting, maintenanc...
Amir R. Khakpour, Alex X. Liu
AAAI
2012
12 years 19 days ago
Identifying Bullies with a Computer Game
Current computer involvement in adolescent social networks (youth between the ages of 11 and 17) provides new opportunities to study group dynamics, interactions amongst peers, an...
Juan Fernando Mancilla-Caceres, Wen Pu, Eyal Amir,...
QSHINE
2009
IEEE
14 years 5 months ago
Joint Optimization of System Lifetime and Network Performance for Real-Time Wireless Sensor Networks
Maximizing the aggregate network utility and minimizing the network energy consumption are important but conflict goals in wireless sensor networks. Challenges arise due to the app...
Lei Rao, Xue Liu, Jian-Jia Chen, Wenyu Liu
ICNP
2003
IEEE
14 years 3 months ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
SIGACT
2010
68views more  SIGACT 2010»
13 years 5 months ago
A survey of buffer management policies for packet switches
Over the past decade, there has been great interest in the study of buffer management policies in the context of packet transmission for network switches. In a typical model, a sw...
Michael H. Goldwasser