Sciweavers

430 search results - page 65 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
14 years 24 days ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
ICC
2011
IEEE
257views Communications» more  ICC 2011»
12 years 7 months ago
Increasing the Lifetime of Roadside Sensor Networks Using Edge-Betweenness Clustering
Abstract—Wireless Sensor Networks are proven highly successful in many areas, including military and security monitoring. In this paper, we propose a method to use the edge–bet...
Joakim Flathagen, Ovidiu Valentin Drugan, Paal E. ...
ICIP
2006
IEEE
14 years 9 months ago
High Definition Video Transmission over Wlans with Time-Scale and R-D Optimized Rate Adaptation
In this paper, we propose a transrating based video rate adaptation technique for compressed high-definition video transmission over wireless local area networks. Our application ...
Mehmet Umut Demircin, Peter van Beek
WIOPT
2010
IEEE
13 years 6 months ago
Resource allocation for cross-layer utility maximization in multi-hop wireless networks in the presence of self interference
Abstract—The cross-layer utility maximization problem subject to stability constraints is considered for a multi-hop wireless network. A time slotted network, where the channel g...
Chathuranga Weeraddana, Marian Codreanu, Matti Lat...
MOBISYS
2006
ACM
14 years 7 months ago
Measurement driven deployment of a two-tier urban mesh access network
Multihop wireless mesh networks can provide Internet access over a wide area with minimal infrastructure expenditure. In this work, we present a measurement driven deployment stra...
Joseph Camp, Joshua Robinson, Christopher Steger, ...