نتایج جستجو برای: opportunistic

تعداد نتایج: 20666  

2002
Anna Scaglione

In this paper, we introduce a new scheme that allows transmission from a set of asynchronous transmitters to a remote destination which, otherwise, would not be capable to forward the data individually. In our scheme the small devices form an Opportunistic Large Array (OLA) by reacting to the signal sent by a special node in the network, called the leader. The problem solution provides as a byp...

2014
Andrea Bittau Michael Hamburg Mark Handley David Mazières Dan Boneh

Network traffic encryption is becoming a requirement, not an option. Enabling encryption will be a communal effort so a solution that gives partial benefits until fully deployed is needed. A solution that requires little changes to existing infrastructure will also help as it can be quickly deployed to give immediate shortterm benefits. We argue that tcpcrypt, a TCP option for opportunistic enc...

2011
Amir Herzberg

We present LOT, a lightweight ‘plug and play’ secure tunneling protocol deployed at network gateways. Two communicating gateways, A and B, running LOT would automatically detect each other and establish an efficient tunnel, securing communication between them. LOT tunnels allow A to discard spoofed packets that specify source addresses in B’s network and vice-versa. This helps to mitigate many ...

2009
Sacha Trifunovic Franck Legendre

Opportunistic networks enables mobile users to participate in social interactions through applications such as content distribution, flea-market, micro-blogs and round based games. To interact securely, the establishment of trust is vital in a distributed environment. Trust is required to validate an identity and avoid sybil users, select trustworthy interaction partners or to collect useful op...

Journal: :IJACI 2009
Hoang Anh Nguyen Silvia Giordano

In Opportunistic Networks (OppNets), mobile devices transmit messages by exploiting the direct contacts, without the need of an end-to-end infrastructure. Disconnections of nodes and high churn rates are normal features of opportunistic networks. Hence, routing is one of the main challenges in this environment. In this article, we provide a survey of the main routing approaches in OppNets and c...

Journal: :Journal of the American Medical Women's Association 1968
M H Field

This book contains a collection of 32 papers presented at the 19th Annual Clinical Conference on Cancer (1974) of the University of Texas, MD Anderson Hospital and Tumor Institute. Twentytwo of the papers were contributed by members of the local hospital staff. The conference was intended to emphasize the expanding role of cancer chemotherapy in the management of cancer patients, and 16 papers ...

2010
Luca Becchetti Luca Filipponi Andrea Vitaletti

In this paper we present an approach to support privacy in opportunistic sensing. In particular, we use compact and privacy preserving representations of data (or sketches), that allow us to compute relevant statistics over data without disclosing users’ sensitive information (e.g. locations). We exemplify our approach by referring to the important application of noise pollution monitoring. We ...

2009
Francesco Giudici Elena Pagani Gian Paolo Rossi Ernesto Damiani

2007
Henri Dubois-Ferriere Matthias Grossglauser Martin Vetterli

In opportunistic routing, each node maintains a group of candidate relays to reach a particular destination, and transmits packets to any node in this group. If a single candidate relay receives the packet, it becomes the effective relay to forward the packet further. If no candidate receives the packet, then the current sender re-transmits. If multiple candidates receive the packet, then the l...

2002
Luisa Bentivogli Emanuele Pianta

Building semantically annotated corpora from scratch is a time consuming activity requiring very specialized resources. In this paper we present a pilot study carried out to test a methodology that can be used to create a semantically annotated corpus by exploiting information contained in an already annotated corpus. The main hypothesis underlying the proposed methodology is that, given a text...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید