—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
A key challenge for the successful deployment of systems consisting of multiple autonomous networked sensors is the development of decentralised mechanisms to coordinate the activ...
W. T. Luke Teacy, Alessandro Farinelli, N. J. Grab...
Network tomography establishes linear relationships between the characteristics of individual links and those of end-toend paths. It has been proved that these relationships can b...
Denisa Ghita, Katerina J. Argyraki, Patrick Thiran
—A cardinal prerequisite for the system design of a sensor network, is to understand the geometric environment where sensor nodes are deployed. The global topology of a largescal...
In distributed real-time systems, meeting the real-time constraints is mandatory but the satisfaction of other application-dependent criteria is most generally required as well. I...