Sciweavers

336 search results - page 32 / 68
» Protocols and Impossibility Results for Gossip-Based Communi...
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks
— Many tasks require multiple sensing capabilities; in Wireless Sensor Networks (WSN), it is expensive to deploy a homogeneous network wherein every sensor has the same functiona...
Xiaoming Lu, Matt Spear, Karl N. Levitt, Shyhtsun ...
ICNP
2000
IEEE
14 years 1 months ago
TCP-Probing: Towards an Error Control Schema with Energy and Throughput Performance Gains
Today’s universal communications increasingly involve mobile and battery-powered devices (e.g. hand-held, laptop) over wired and wireless networks. Energy efficiency, as well as...
Vassilios Tsaoussidis, Hussein G. Badr
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 3 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz
JSAC
2008
196views more  JSAC 2008»
13 years 8 months ago
Comparison and Evaluation of the T-Lohi MAC for Underwater Acoustic Sensor Networks
Abstract--This paper introduces T-Lohi, a new class of distributed and energy-efficient media-access protocols (MAC) for underwater acoustic sensor networks (UWSN). MAC design for ...
Affan A. Syed, Wei Ye, John S. Heidemann
INFOCOM
2011
IEEE
13 years 7 days ago
Optimal Sybil-resilient node admission control
—Most existing large-scale networked systems on the Internet such as peer-to-peer systems are vulnerable to Sybil attacks where a single adversary can introduce many bogus identi...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...