• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 28,304
Next 10 →

LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks

by Sencun Zhu , 2003
"... Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the same time restricting the security impact of a node compromise to the immediate network neighborhood of the compromised node. The design of the protocol is motivated by the observ ..."
Abstract - Cited by 469 (22 self) - Add to MetaCart
Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the same time restricting the security impact of a node compromise to the immediate network neighborhood of the compromised node. The design of the protocol is motivated

Transform Analysis and Asset Pricing for Affine Jump-Diffusions

by Darrell Duffie, Jun Pan, Kenneth Singleton - Econometrica , 2000
"... In the setting of ‘‘affine’ ’ jump-diffusion state processes, this paper provides an analytical treatment of a class of transforms, including various Laplace and Fourier transforms as special cases, that allow an analytical treatment of a range of valuation and econometric problems. Example applicat ..."
Abstract - Cited by 710 (38 self) - Add to MetaCart
applications include fixed-income pricing models, with a role for intensity-based models of default, as well as a wide range of option-pricing applications. An illustrative example examines the implications of stochastic volatility and jumps for option valuation. This example highlights the impact on option

Energy-efficient communication protocol for wireless microsensor networks

by Wendi Rabiner Heinzelman, Anantha Chandrakasan, Hari Balakrishnan , 2000
"... Wireless distributed microsensor systems will enable the reliable monitoring of a variety of environments for both civil and military applications. In this paper, we look at communication protocols, which can have significant impact on the overall energy dissipation of these networks. Based on our f ..."
Abstract - Cited by 2103 (10 self) - Add to MetaCart
Wireless distributed microsensor systems will enable the reliable monitoring of a variety of environments for both civil and military applications. In this paper, we look at communication protocols, which can have significant impact on the overall energy dissipation of these networks. Based on our

Evaluation of Release Consistent Software Distributed Shared Memory on Emerging Network Technology

by Sandhya Dwarkadas, Pete Keleher, Alan L. Cox, Willy Zwaenepoel
"... We evaluate the effect of processor speed, network characteristics, and software overhead on the performance of release-consistent software distributed shared memory. We examine five different protocols for implementing release consistency: eager update, eager invalidate, lazy update, lazy invalidat ..."
Abstract - Cited by 467 (43 self) - Add to MetaCart
We evaluate the effect of processor speed, network characteristics, and software overhead on the performance of release-consistent software distributed shared memory. We examine five different protocols for implementing release consistency: eager update, eager invalidate, lazy update, lazy

Search and replication in unstructured peer-to-peer networks

by Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenker , 2002
"... Abstract Decentralized and unstructured peer-to-peer networks such as Gnutella are attractive for certain applicationsbecause they require no centralized directories and no precise control over network topologies and data placement. However, the flooding-based query algorithm used in Gnutella does n ..."
Abstract - Cited by 692 (6 self) - Add to MetaCart
propose a query algorithm based on multiple random walks that resolves queries almost as quickly as gnutella's flooding method while reducing the network traffic by two orders of mag-nitude in many cases. We also present a distributed replication strategy that yields close-to-optimal performance

The Impact of Data Aggregation in Wireless Sensor Networks

by Bhaskar Krishnamachari, Deborah Estrin, Stephen Wicker
"... Sensor networks are distributed event-based systems that differ from traditional communication networks in several ways: sensor networks have severe energy constraints, redundant low-rate data, and many-to-one flows. Datacentric mechanisms that perform in-network aggregation of data are needed in th ..."
Abstract - Cited by 400 (12 self) - Add to MetaCart
Sensor networks are distributed event-based systems that differ from traditional communication networks in several ways: sensor networks have severe energy constraints, redundant low-rate data, and many-to-one flows. Datacentric mechanisms that perform in-network aggregation of data are needed

Measuring Distributional Impacts

by Tim Callan, John Walsh, Kieran Coleman
"... Much of the comment on Budget 2005 has focused on whether it lived up to its advance billing as a “socially inclusive budget ” and on supposed contrasts between the distributive impact of Budget 2005 and earlier budgets. Typically these comments are based on small numbers of examples,1 and on a fram ..."
Abstract - Add to MetaCart
Much of the comment on Budget 2005 has focused on whether it lived up to its advance billing as a “socially inclusive budget ” and on supposed contrasts between the distributive impact of Budget 2005 and earlier budgets. Typically these comments are based on small numbers of examples,1 and on a

The distributional impact of social security

by Michael D. Hurd, John B. Shoven , 1985
"... March 23—26, 1983, Dorado Beach, Puerto Rico. The authors would like to thank Beth Van Zuinmeren for her splendid and exhausting research assistance. Without her extraordinary work, the paper would not have been possible. We have also greatly benefited from the extremely efficient and capable assist ..."
Abstract - Cited by 27 (0 self) - Add to MetaCart
March 23—26, 1983, Dorado Beach, Puerto Rico. The authors would like to thank Beth Van Zuinmeren for her splendid and exhausting research assistance. Without her extraordinary work, the paper would not have been possible. We have also greatly benefited from the extremely efficient and capable assistance of Steve Galatis and

DISTRIBUTIONAL IMPACTS CHAPTER 6

by unknown authors
"... This chapter discusses our proposed methods for characterizing distributional impacts of the UST cleanup program, including environmental justice impacts, risk tradeoffs, economic impacts (including employment and economicgrowtheffects), and promotion of brownfields redevelopment. We also provide a ..."
Abstract - Add to MetaCart
This chapter discusses our proposed methods for characterizing distributional impacts of the UST cleanup program, including environmental justice impacts, risk tradeoffs, economic impacts (including employment and economicgrowtheffects), and promotion of brownfields redevelopment. We also provide a

The impact of imperfect scheduling on cross-layer congestion control in wireless networks

by Xiaojun Lin, Ness B. Shroff , 2005
"... In this paper, we study cross-layer design for congestion control in multihop wireless networks. In previous work, we have developed an optimal cross-layer congestion control scheme that jointly computes both the rate allocation and the stabilizing schedule that controls the resources at the under ..."
Abstract - Cited by 349 (32 self) - Add to MetaCart
-layer congestion control will be impacted if the network can only use an imperfect (and potentially distributed) scheduling component that is easier to implement. We study both the case when the number of users in the system is fixed and the case with dynamic arrivals and departures of the users, and we establish
Next 10 →
Results 1 - 10 of 28,304
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University