-
1
-
-
38549136891
-
Gateway placement for throughput optimization in wireless mesh networks
-
F. Li, Y. Wang, and X.-Y. Li, "Gateway placement for throughput optimization in wireless mesh networks," in Proc. 2007 IEEE ICC, pp. 4955-4960.
-
Proc. 2007 IEEE ICC
, pp. 4955-4960
-
-
Li, F.1
Wang, Y.2
Li, X.-Y.3
-
2
-
-
77955914908
-
Distributed gateway placement for cost minimization in wireless mesh networks
-
X. Xu, S. Tang, X. Mao, and X.-Y. Li, "Distributed gateway placement for cost minimization in wireless mesh networks," in Proc. 2010 IEEE ICDCS, pp. 507-515.
-
Proc. 2010 IEEE ICDCS
, pp. 507-515
-
-
Xu, X.1
Tang, S.2
Mao, X.3
Li, X.-Y.4
-
3
-
-
77955098947
-
Utility-based gateway deployment for supporting multi-domain dtns
-
T. He, K.-W. Lee, N. Sofra, and K. K. Leung, "Utility-based gateway deployment for supporting multi-domain dtns," in Proc. 2010 IEEE SECON, pp. 341-349.
-
Proc. 2010 IEEE SECON
, pp. 341-349
-
-
He, T.1
Lee, K.-W.2
Sofra, N.3
Leung, K.K.4
-
4
-
-
80053603420
-
Optimal gateway selection in multi-domain wireless networks: A potential game perspective
-
P. Ramanathan, T. Nandagopal, and B. N. Levine, Eds.
-
Y. Song, S. H. Y. Wong, and K.-W. Lee, "Optimal gateway selection in multi-domain wireless networks: a potential game perspective," in Proc. 2011 ACM MOBICOM, P. Ramanathan, T. Nandagopal, and B. N. Levine, Eds., pp. 325-336.
-
Proc. 2011 ACM MOBICOM
, pp. 325-336
-
-
Song, Y.1
Wong, S.H.Y.2
Lee, K.-W.3
-
5
-
-
65249158414
-
Inter-domain routing for mobile ad hoc networks
-
Available
-
C.-K. Chau, J. Crowcroft, K.-W. Lee, and S. H. Wong, "Inter-domain routing for mobile ad hoc networks," in Proc. 2008 ACM International Workshop on Mobility in the Evolving Internet Architecture, pp. 61-66. Available: http://doi.acm.org.gate.lib.buffalo.edu/10.1145/1403007.1403022
-
Proc. 2008 ACM International Workshop on Mobility in the Evolving Internet Architecture
, pp. 61-66
-
-
Chau, C.-K.1
Crowcroft, J.2
Lee, K.-W.3
Wong, S.H.4
-
7
-
-
77953312094
-
VBS: Maximum lifetime sleep scheduling for wireless sensor networks using virtual backbones
-
Y. Zhao, J. Wu, F. Li, and S. Lu, "VBS: maximum lifetime sleep scheduling for wireless sensor networks using virtual backbones," in Proc. 2010 IEEE INFOCOM, pp. 1-5.
-
Proc. 2010 IEEE INFOCOM
, pp. 1-5
-
-
Zhao, Y.1
Wu, J.2
Li, F.3
Lu, S.4
-
8
-
-
70349756784
-
Heterogeneous multi domain network architecture for military communications
-
L. Barolli, F. Xhafa, and H.-H. Hsu, Eds.
-
A. Durresi, M. Durresi, and L. Barolli, "Heterogeneous multi domain network architecture for military communications," in Proc. 2009 IEEE CISIS, L. Barolli, F. Xhafa, and H.-H. Hsu, Eds., pp. 382-387.
-
Proc. 2009 IEEE CISIS
, pp. 382-387
-
-
Durresi, A.1
Durresi, M.2
Barolli, L.3
-
9
-
-
0041783510
-
Privacy-preserving data mining
-
W. Chen, J. F. Naughton, and P. A. Bernstein, Eds.
-
R. Agrawal and R. Srikant, "Privacy-preserving data mining," in Proc. 2000 ACM SIGMOD Conference, W. Chen, J. F. Naughton, and P. A. Bernstein, Eds., pp. 439-450.
-
Proc. 2000 ACM SIGMOD Conference
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
10
-
-
84927517111
-
Privacy-preserving cooperative statistical analysis
-
W. Du and M. J. Atallah, "Privacy-preserving cooperative statistical analysis," in Proc. 2001 IEEE ACSAC, pp. 102-110.
-
Proc. 2001 IEEE ACSAC
, pp. 102-110
-
-
Du, W.1
Atallah, M.J.2
-
11
-
-
0242698195
-
On the design and quantification of privacy preserving data mining algorithms
-
P. Buneman, Ed.
-
D. Agrawal and C. C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," in Proc. 2001 ACM PODS, P. Buneman, Ed.
-
Proc. 2001 ACM PODS
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
12
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the privacy preserving properties of random data perturbation techniques," in Proc. 2003 IEEE ICDM, pp. 99-106.
-
Proc. 2003 IEEE ICDM
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
13
-
-
84958048324
-
Data swapping: Balancing privacy against precision in mining for logic rules
-
Proc. 1999 Springer DaWaK, ser. M. K. Mohania and A. M. Tjoa, Eds.
-
V. Estivill-Castro and L. Brankovic, "Data swapping: balancing privacy against precision in mining for logic rules," in Proc. 1999 Springer DaWaK, ser. Lecture Notes in Computer Science, M. K. Mohania and A. M. Tjoa, Eds., vol. 1676, pp. 389-398.
-
Lecture Notes in Computer Science
, vol.1676
, pp. 389-398
-
-
Estivill-Castro, V.1
Brankovic, L.2
-
14
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless networks
-
E. Royer and C. Toh, "A review of current routing protocols for ad hoc mobile wireless networks," IEEE Pers. Commun., vol. 6, no. 2, pp. 46-55, 1999.
-
(1999)
IEEE Pers. Commun.
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.1
Toh, C.2
-
15
-
-
39049106045
-
Hierarchical inter-domain routing in optical dwdm networks
-
Q. Liu, M. A. Kok, N. Ghani, V. M. Muthalaly, and M. Wang, "Hierarchical inter-domain routing in optical dwdm networks," in Proc. 2006 IEEE INFOCOM..
-
Proc. 2006 IEEE INFOCOM
-
-
Liu, Q.1
Kok, M.A.2
Ghani, N.3
Muthalaly, V.M.4
Wang, M.5
-
16
-
-
65249158414
-
Inter-domain routing for mobile ad hoc networks
-
C. Chau, J. Crowcroft, K. Lee, and S. Wong, "Inter-domain routing for mobile ad hoc networks," in Proc. 2008 ACM International Workshop on Mobility in the Evolving Internet Architecture, pp. 61-66.
-
Proc. 2008 ACM International Workshop on Mobility in the Evolving Internet Architecture
, pp. 61-66
-
-
Chau, C.1
Crowcroft, J.2
Lee, K.3
Wong, S.4
-
19
-
-
78751523747
-
-
I. IBM ILOG. Available
-
I. IBM ILOG. (2009) IBM ILOG CPLEX v12.1 User's Manual for CPLEX. Available: ftp://public.dhe.ibm.com/software/websphere/ilog/docs/optimization/ cplex/ps$\$usrmancplex.pdf
-
(2009)
IBM ILOG CPLEX V12.1 User's Manual for CPLEX
-
-
-
21
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
Proc. 1997 Springer EUROCRYPT, ser. W. Fumy, Ed.
-
R. Cramer, R. Gennaro, and B. Schoenmakers, "A secure and optimally efficient multi-authority election scheme," in Proc. 1997 Springer EUROCRYPT, ser. Lecture Notes in Computer Science, W. Fumy, Ed., vol. 1233, pp. 103-118.
-
Lecture Notes in Computer Science
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
22
-
-
4244053632
-
Efficient protocols based on probabilistic encryption using composite degree residue classes
-
I. Damg̊ard and M. Jurik, "Efficient protocols based on probabilistic encryption using composite degree residue classes," IACR Cryptology ePrint Archive, vol. 2000, p. 8, 2000.
-
(2000)
IACR Cryptology ePrint Archive
, vol.2000
, pp. 8
-
-
Damg̊ard, I.1
Jurik, M.2
-
23
-
-
0020312165
-
Protocols for secure computations (extended abstract)
-
A. C.-C. Yao, "Protocols for secure computations (extended abstract)," in Proc. 1982 IEEE FOCS, pp. 160-164.
-
Proc. 1982 IEEE FOCS
, pp. 160-164
-
-
Yao, A.C.-C.1
-
24
-
-
70449575839
-
Homomorphic encryption and secure comparison
-
I. Damg̊ard, M. Geisler, and M. Krøigaard, "Homomorphic encryption and secure comparison," IJACT, vol. 1, no. 1, pp. 22-31, 2008.
-
(2008)
IJACT
, vol.1
, Issue.1
, pp. 22-31
-
-
Damg̊ard, I.1
Geisler, M.2
Krøigaard, M.3
-
25
-
-
38049034355
-
Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
-
Proc. 2007 Springer Public Key Cryptography, ser. T. Okamoto and X. Wang, Eds.
-
T. Nishide and K. Ohta, "Multiparty computation for interval, equality, and comparison without bit-decomposition protocol," in Proc. 2007 Springer Public Key Cryptography, ser. Lecture Notes in Computer Science, T. Okamoto and X. Wang, Eds., vol. 4450, pp. 343-360.
-
Lecture Notes in Computer Science
, vol.4450
, pp. 343-360
-
-
Nishide, T.1
Ohta, K.2
-
26
-
-
85023809951
-
Threshold cryptosystems
-
Proc. 1989 Springer CRYPTO, ser. G. Brassard, Ed.
-
Y. Desmedt and Y. Frankel, "Threshold cryptosystems," in Proc. 1989 Springer CRYPTO, ser. Lecture Notes in Computer Science, G. Brassard, Ed., vol. 435, pp. 307-315.
-
Lecture Notes in Computer Science
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
|