Sciweavers

1551 search results - page 156 / 311
» Privacy-Preserving Network Aggregation
Sort
View
ICNP
2003
IEEE
14 years 3 months ago
Optimal Resource Allocation in Overlay Multicast
This paper targets the problem of optimal resource allocation in overlay multicast, which poses both theoretical and practical challenges. Theoretically, resource allocation among...
Yi Cui, Yuan Xue, Klara Nahrstedt
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
14 years 11 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh
MOBISYS
2007
ACM
14 years 10 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
ANSS
2008
IEEE
14 years 4 months ago
Beyond the Model of Persistent TCP Flows: Open-Loop vs Closed-Loop Arrivals of Non-persistent Flows
It is common for simulation and analytical studies to model Internet traffic as an aggregation of mostly persistent TCP flows. In practice, however, flows follow a heavytailed ...
Ravi S. Prasad, Constantine Dovrolis
VTC
2007
IEEE
192views Communications» more  VTC 2007»
14 years 4 months ago
Access Scheduling Based on Time Water-Filling for Next Generation Wireless LANs
Opportunistic user access scheduling enhances the capacity of wireless networks by exploiting the multi user diversity. When frame aggregation is used, opportunistic schemes are no...
Ertugrul Necdet Ciftcioglu, Özgür Gü...