Sciweavers

1510 search results - page 102 / 302
» Secure Distributed Data Aggregation
Sort
View
ICDCIT
2004
Springer
14 years 3 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
GLOBECOM
2007
IEEE
14 years 4 months ago
Mobility-Aided Routing in Multi-Hop Heterogeneous Networks with Group Mobility
— This paper investigates routing strategies for mobile and heterogeneous multi-hop wireless networks. We leverage the knowledge about users mobility to improve the efficiency o...
Leonardo Badia, Nicola Bui, Marco Miozzo, Michele ...
AINA
2006
IEEE
14 years 4 months ago
Clustering Protocol for Sensor Networks
In this paper we present Clustering Protocol (CP) for sensor networks. Clustering techniques are used by different protocols and applications to increase scalability and reduce de...
Arjan Durresi, Vamsi Paruchuri, Leonard Barolli
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 10 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
DMSN
2004
ACM
14 years 3 months ago
Active rules for sensor databases
Recent years have witnessed a rapidly growing interest in query processing in sensor and actuator networks. This is mainly due to the increased awareness of query processing as th...
Michael Zoumboulakis, George Roussos, Alexandra Po...