Sciweavers

833 search results - page 97 / 167
» Simpler and better approximation algorithms for network desi...
Sort
View
129
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
114
Voted
ICC
2007
IEEE
177views Communications» more  ICC 2007»
15 years 10 months ago
Intelligent Gateways Placement for Reduced Data Latency in Wireless Sensor Networks
— Many applications of wireless sensor networks (WSNs) have emerged over the last few years. In such networks resource-constrained sensor nodes are deployed to probe their surrou...
Waleed A. Youssef, Mohamed F. Younis
134
Voted
SODA
2007
ACM
127views Algorithms» more  SODA 2007»
15 years 5 months ago
Line-of-sight networks
Random geometric graphs have been one of the fundamental models for reasoning about wireless networks: one places n points at random in a region of the plane (typically a square o...
Alan M. Frieze, Jon M. Kleinberg, R. Ravi, Warren ...
149
Voted
MOBICOM
2009
ACM
15 years 10 months ago
Lifetime and coverage guarantees through distributed coordinate-free sensor activation
Wireless Sensor Networks are emerging as a key sensing technology, with diverse military and civilian applications. In these networks, a large number of sensors perform distribute...
Gaurav S. Kasbekar, Yigal Bejerano, Saswati Sarkar
158
Voted
PODS
2003
ACM
132views Database» more  PODS 2003»
16 years 3 months ago
The view selection problem for XML content based routing
We consider the view selection problem for XML content based routing: given a network, in which a stream of XML documents is routed and the routing decisions are taken based on re...
Ashish Kumar Gupta, Dan Suciu, Alon Y. Halevy