Sciweavers

1573 search results - page 195 / 315
» Reliable Communication in Overlay Networks
Sort
View
129
Voted
ACISP
2007
Springer
15 years 8 months ago
On Proactive Perfectly Secure Message Transmission
This paper studies the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of a Byzantine mobile adversary that may move from...
Kannan Srinathan, Prasad Raghavendra, C. Pandu Ran...
134
Voted
EUROSYS
2006
ACM
16 years 1 months ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
GLOBECOM
2010
IEEE
15 years 2 months ago
Information Epidemics in Complex Networks with Opportunistic Links and Dynamic Topology
Abstract--Wireless networks, especially mobile ad hoc networks (MANET) and cognitive radio networks (CRN), are facing two new challenges beyond traditional random network model: op...
Pin-Yu Chen, Kwang-Cheng Chen
141
Voted
GLOBECOM
2008
IEEE
15 years 4 months ago
Modified Beacon-Enabled IEEE 802.15.4 MAC for Lower Latency
Industrial sensing, monitoring and automation offer a lucrative application domain for networking and communications. Wired sensor networks have traditionally been used for these ...
G. Bhatti, A. Mehta, Zafer Sahinoglu, J. Zhang, R....
TIT
2008
95views more  TIT 2008»
15 years 4 months ago
Error Exponent Regions for Gaussian Broadcast and Multiple-Access Channels
In modern communication systems, different users have different requirements for quality of service (QoS). In this work, QoS refers to the average codeword error probability experi...
Lihua Weng, S. Sandeep Pradhan, Achilleas Anastaso...