Sciweavers

942 search results - page 136 / 189
» A mechanism design approach to the stabilization of networke...
Sort
View
PERCOM
2008
ACM
13 years 9 months ago
Composing software services in the pervasive computing environment: Languages or APIs?
The pervasive computing environment will be composed of heterogeneous services. In this work, we have explored how a domain specific language for service composition can be implem...
Jon Robinson, Ian Wakeman, Dan Chalmers
INFOCOM
2011
IEEE
13 years 22 days ago
SocialFilter: Introducing social trust to collaborative spam mitigation
—We propose SocialFilter, a trust-aware collaborative spam mitigation system. Our proposal enables nodes with no email classification functionality to query the network on wheth...
Michael Sirivianos, Kyungbaek Kim, Xiaowei Yang
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 10 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
HICSS
2003
IEEE
167views Biometrics» more  HICSS 2003»
14 years 2 months ago
An Adaptive QoS Routing Protocol with Dispersity for Ad-hoc Networks
In this paper, we present the design and simulation of a bandwidth constrained multiple path on-demand routing protocol for ad-hoc networks to support end-to-end Quality of Servic...
Youngki Hwang, Pramod Varshney
COMCOM
2008
153views more  COMCOM 2008»
13 years 9 months ago
Available bandwidth estimation and admission control for QoS routing in wireless mesh networks
This article presents an integrated admission control and routing mechanism for multi-rate wireless mesh networks. Admission control depends on precise estimates of available band...
Mesut Ali Ergin, Marco Gruteser, Lin Luo, Dipankar...