Sciweavers

1551 search results - page 18 / 311
» Privacy-Preserving Network Aggregation
Sort
View
ICNP
1999
IEEE
13 years 12 months ago
An In-Depth Look at Flow Aggregation for Efficient Quality of Service
We investigate the preservation of quality of service guarantees to a flow of packets in the presence of flow aggregation. For efficiency, multiple flows, known as the constituent...
Jorge Arturo Cobb
TKDE
2012
487views Formal Methods» more  TKDE 2012»
11 years 10 months ago
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
—Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of som...
Rajeev Gupta, Krithi Ramamritham
IPPS
2008
IEEE
14 years 1 months ago
On performance bottleneck of anonymous communication networks
Although a significant amount of effort has been directed at discovering attacks against anonymity communication networks and developing countermeasures to those attacks, there i...
Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu
PEWASUN
2006
ACM
14 years 1 months ago
Coordinated data aggregation in wireless sensor networks using the Omega failure detector
We present an algorithm implementing the failure detector class omega (Ω) in the crash-recovery model to coordinate data aggregation in wireless sensor networks. In order to mini...
Mikel Larrea, Cristian Martín, José ...
IPPS
2006
IEEE
14 years 1 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi