Sciweavers

1551 search results - page 150 / 311
» Privacy-Preserving Network Aggregation
Sort
View
PSYCHNOLOGY
2008
156views more  PSYCHNOLOGY 2008»
13 years 9 months ago
SIM: A dynamic multidimensional visualization method for social networks
Visualization plays an important role in social networks analysis to explore and investigate individual and groups behaviours. Therefore, different approaches have been proposed f...
Maria Chiara Caschera, Fernando Ferri, Patrizia Gr...
JSAC
2011
137views more  JSAC 2011»
13 years 5 months ago
Cognitive Network Interference
—Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause...
Alberto Rabbachin, Tony Q. S. Quek, Hyundong Shin,...
GLOBECOM
2006
IEEE
14 years 4 months ago
Key Distribution in Mobile Heterogeneous Sensor Networks
— Key predistribution is a popular technique for key distribution in sensor networks. The schemes available in current literature using this approach are for nodes with no or lim...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri, Mimo...
IMC
2009
ACM
14 years 4 months ago
Triangle inequality variations in the internet
Triangle inequality violations (TIVs) are important for latency sensitive distributed applications. On one hand, they can expose opportunities to improve network routing by findi...
Cristian Lumezanu, Randolph Baden, Neil Spring, Bo...
DEBS
2008
ACM
14 years 2 days ago
Event-based constraints for sensornet programming
We propose a sensornet programming model based on declarative spatio-temporal constraints on events only, not sensors. Where previous approaches conflate events and sensors becaus...
Jie Mao, John Jannotti, Mert Akdere, Ugur Ç...