Sciweavers

1597 search results - page 168 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
CIDM
2009
IEEE
14 years 1 months ago
An architecture and algorithms for multi-run clustering
—This paper addresses two main challenges for clustering which require extensive human effort: selecting appropriate parameters for an arbitrary clustering algorithm and identify...
Rachsuda Jiamthapthaksin, Christoph F. Eick, Vadee...
PERCOM
2009
ACM
14 years 4 months ago
Auction-Based Congestion Management for Target Tracking in Wireless Sensor Networks
—This paper addresses the problem of providing congestion-management for a shared wireless sensor networkbased target tracking system. In many large-scale wireless sensor network...
Lei Chen 0005, Boleslaw K. Szymanski, Joel W. Bran...
MOBIHOC
2004
ACM
14 years 2 months ago
An adaptive strategy for maximizing throughput in MAC layer wireless multicast
Bandwidth efficiency of wireless multicast can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. T...
Prasanna Chaporkar, Anita Bhat, Saswati Sarkar
EUROCRYPT
2010
Springer
14 years 2 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
DOLAP
2004
ACM
14 years 2 months ago
Beyond data warehousing: what's next in business intelligence?
During the last ten years the approach to business management has deeply changed, and companies have understood the importance of enforcing achievement of the goals defined by the...
Matteo Golfarelli, Stefano Rizzi, Iuris Cella