Sciweavers

1646 search results - page 281 / 330
» A genetic algorithm for designing distributed computer netwo...
Sort
View
130
Voted
SI3D
1995
ACM
15 years 7 months ago
RING: A Client-Server System for Multi-User Virtual Environments
This paper describes the client-server design, implementation and experimental results for a system that supports real-time visual interaction between a large number of users in a...
Thomas A. Funkhouser
156
Voted
MOBIHOC
2004
ACM
15 years 9 months ago
A message ferrying approach for data delivery in sparse mobile ad hoc networks
Mobile Ad Hoc Networks (MANETs) provide rapidly deployable and self-configuring network capacity required in many critical applications, e.g., battlefields, disaster relief and ...
Wenrui Zhao, Mostafa H. Ammar, Ellen W. Zegura
149
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
152
Voted
CCS
2007
ACM
15 years 9 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
140
Voted
SIGCOMM
2006
ACM
15 years 9 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...