Sciweavers

1551 search results - page 299 / 311
» Privacy-Preserving Network Aggregation
Sort
View
ISSA
2004
13 years 9 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
GI
2008
Springer
13 years 8 months ago
A Novel Conceptual Model for Accessing Distributed Data and Applications, as well as Devices
: As data and services are increasingly distributed in the network, rather than stored in a fixed location, one can imagine a scenario in which the Personal Computer, intended as a...
Lucia Terrenghi, Thomas Lang
SIGCOMM
2010
ACM
13 years 7 months ago
Contrabass: concurrent transmissions without coordination
A PHY and MAC protocol for MIMO concurrent transmissions, called Contrabass, is presented. Concurrent transmissions, also referred to as multi-user MIMO, are simultaneous transmis...
Sungro Yoon
JSAC
2008
161views more  JSAC 2008»
13 years 7 months ago
HC-MAC: A Hardware-Constrained Cognitive MAC for Efficient Spectrum Management
Abstract--Radio spectrum resource is of fundamental importance for wireless communication. Recent reports show that most available spectrum has been allocated. While some of the sp...
Juncheng Jia, Qian Zhang, Xuemin Shen
MMS
2006
13 years 7 months ago
Adaptive receiver-driven streaming from multiple senders
This paper presents design and evaluation of an adaptive streaming mechanism from multiple senders to a single receiver in Peer-toPeer (P2P) networks, called P2P Adaptive Layered ...
Nazanin Magharei, Reza Rejaie