Sciweavers

942 search results - page 87 / 189
» A mechanism design approach to the stabilization of networke...
Sort
View
WMCSA
2003
IEEE
14 years 2 months ago
Selecting Devices for Aggregation
As intelligent devices become affordable and wireless infrastructure becomes pervasive, the potential to combine, or aggregate, device functionality to provide a user with a bette...
Rajnish Kumar, Vahe Poladian, Ira Greenberg, Alan ...
INFOCOM
2006
IEEE
14 years 3 months ago
Capacity of Wireless Data Networks with Intra- and Inter-Cell Mobility
— The performance of wireless data systems has been thoroughly studied in the context of a single base station. In the present paper we analyze networks with several interacting ...
Sem C. Borst, Alexandre Proutiére, Nidhi He...
PERCOM
2005
ACM
14 years 8 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
IFIPTM
2010
117views Management» more  IFIPTM 2010»
13 years 7 months ago
Leveraging a Social Network of Trust for Promoting Honesty in E-Marketplaces
Abstract. In this paper, we examine a trust-based framework for promoting honesty in e-marketplaces that relies on buyers forming social networks to share reputation ratings of sel...
Jie Zhang, Robin Cohen, Kate Larson
KBSE
2005
IEEE
14 years 2 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer